Overview
overview
10Static
static
3ae2e1cbf84...23.exe
windows7-x64
1ae2e1cbf84...23.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3UKHook40.dll
windows7-x64
3UKHook40.dll
windows10-2004-x64
3UniKey.exe
windows7-x64
1UniKey.exe
windows10-2004-x64
1ukfaq.htm
windows7-x64
1ukfaq.htm
windows10-2004-x64
1ukmanual.htm
windows7-x64
1ukmanual.htm
windows10-2004-x64
1uninst.exe
windows7-x64
1uninst.exe
windows10-2004-x64
10Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
ae2e1cbf8477077d682a9e7882e80023.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae2e1cbf8477077d682a9e7882e80023.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
UKHook40.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
UKHook40.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
UniKey.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
UniKey.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
ukfaq.htm
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
ukfaq.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
ukmanual.htm
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
ukmanual.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240221-en
General
-
Target
ae2e1cbf8477077d682a9e7882e80023.exe
-
Size
442KB
-
MD5
ae2e1cbf8477077d682a9e7882e80023
-
SHA1
68a8704904c4f7cd66f516f3b21a484ea689fe23
-
SHA256
4fa40060e1698c4f15b1fc6cacabe31e0de49e0092f4368be58d22e5d7c496c9
-
SHA512
6f51abc0c59c92c3af41c4ee151290a84a783deced7e5934bd6586a05aa54b673e1d69ea1eb88297d151dfb4a241b6976a421e3fc2fa23ad10da028eb49e6e63
-
SSDEEP
12288:UdTTlUxZuKpf5oIzrUXZCGs/5eBXv8J1Q0TGvqSRnQ:UdTTlGuK0IkXEGsh2f8J1Q0TGS0nQ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ae2e1cbf8477077d682a9e7882e80023.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" ae2e1cbf8477077d682a9e7882e80023.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2984 netsh.exe -
resource yara_rule behavioral2/memory/1600-5-0x0000000002320000-0x0000000003353000-memory.dmp upx behavioral2/memory/1600-7-0x0000000002320000-0x0000000003353000-memory.dmp upx behavioral2/memory/1600-8-0x0000000002320000-0x0000000003353000-memory.dmp upx behavioral2/memory/1600-25-0x0000000002320000-0x0000000003353000-memory.dmp upx behavioral2/memory/1600-26-0x0000000002320000-0x0000000003353000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ae2e1cbf8477077d682a9e7882e80023.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc ae2e1cbf8477077d682a9e7882e80023.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ae2e1cbf8477077d682a9e7882e80023.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI ae2e1cbf8477077d682a9e7882e80023.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 ae2e1cbf8477077d682a9e7882e80023.exe 1600 ae2e1cbf8477077d682a9e7882e80023.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe Token: SeDebugPrivilege 1600 ae2e1cbf8477077d682a9e7882e80023.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2984 1600 ae2e1cbf8477077d682a9e7882e80023.exe 87 PID 1600 wrote to memory of 2984 1600 ae2e1cbf8477077d682a9e7882e80023.exe 87 PID 1600 wrote to memory of 2984 1600 ae2e1cbf8477077d682a9e7882e80023.exe 87 PID 1600 wrote to memory of 776 1600 ae2e1cbf8477077d682a9e7882e80023.exe 4 PID 1600 wrote to memory of 780 1600 ae2e1cbf8477077d682a9e7882e80023.exe 82 PID 1600 wrote to memory of 384 1600 ae2e1cbf8477077d682a9e7882e80023.exe 78 PID 1600 wrote to memory of 2428 1600 ae2e1cbf8477077d682a9e7882e80023.exe 51 PID 1600 wrote to memory of 2448 1600 ae2e1cbf8477077d682a9e7882e80023.exe 50 PID 1600 wrote to memory of 2568 1600 ae2e1cbf8477077d682a9e7882e80023.exe 47 PID 1600 wrote to memory of 3444 1600 ae2e1cbf8477077d682a9e7882e80023.exe 39 PID 1600 wrote to memory of 3636 1600 ae2e1cbf8477077d682a9e7882e80023.exe 9 PID 1600 wrote to memory of 3884 1600 ae2e1cbf8477077d682a9e7882e80023.exe 37 PID 1600 wrote to memory of 3980 1600 ae2e1cbf8477077d682a9e7882e80023.exe 36 PID 1600 wrote to memory of 4044 1600 ae2e1cbf8477077d682a9e7882e80023.exe 10 PID 1600 wrote to memory of 684 1600 ae2e1cbf8477077d682a9e7882e80023.exe 35 PID 1600 wrote to memory of 4120 1600 ae2e1cbf8477077d682a9e7882e80023.exe 34 PID 1600 wrote to memory of 2184 1600 ae2e1cbf8477077d682a9e7882e80023.exe 12 PID 1600 wrote to memory of 2444 1600 ae2e1cbf8477077d682a9e7882e80023.exe 23 PID 1600 wrote to memory of 4472 1600 ae2e1cbf8477077d682a9e7882e80023.exe 18 PID 1600 wrote to memory of 1652 1600 ae2e1cbf8477077d682a9e7882e80023.exe 17 PID 1600 wrote to memory of 704 1600 ae2e1cbf8477077d682a9e7882e80023.exe 16 PID 1600 wrote to memory of 2984 1600 ae2e1cbf8477077d682a9e7882e80023.exe 87 PID 1600 wrote to memory of 2984 1600 ae2e1cbf8477077d682a9e7882e80023.exe 87 PID 1600 wrote to memory of 4656 1600 ae2e1cbf8477077d682a9e7882e80023.exe 88 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ae2e1cbf8477077d682a9e7882e80023.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3636
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4044
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\ae2e1cbf8477077d682a9e7882e80023.exe"C:\Users\Admin\AppData\Local\Temp\ae2e1cbf8477077d682a9e7882e80023.exe"1⤵
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1600 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
PID:2984 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4656
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:704
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:1652
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:4472
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2444
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4120
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:684
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3980
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3884
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2448
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2428
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:384
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1