Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
7fe8ef289ddbd7e28a821d348d599f34eb4fb63063002cdf3824d85790d3a43a.dll
Resource
win7-20240221-en
General
-
Target
7fe8ef289ddbd7e28a821d348d599f34eb4fb63063002cdf3824d85790d3a43a.dll
-
Size
120KB
-
MD5
5ddc08d470587bb019ff32160f4ff91e
-
SHA1
3e7c865db11a4be94366f3610ee9941700c98143
-
SHA256
7fe8ef289ddbd7e28a821d348d599f34eb4fb63063002cdf3824d85790d3a43a
-
SHA512
f8e8f5582f56ee9af4d50e9e4ceb58067136453e52df66334393f9c411347a05aacc5596ed36cd656cac492d13b888db58f58d91b691bb8a33cd690b9e9fe8c5
-
SSDEEP
3072:3a84VMQBV7fJvoN1m5XcwUaWAUDi+/q6UifSNze2T:3FazV7f2N1uXJUaWAGiJu6pXT
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e5746cd.exee576244.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e576244.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e576244.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e576244.exe -
Processes:
e5746cd.exee576244.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576244.exe -
Processes:
e576244.exee5746cd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5746cd.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 32 IoCs
Processes:
resource yara_rule behavioral2/memory/2740-7-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-9-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-10-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-12-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-29-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-31-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-18-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-32-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-33-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-34-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-35-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-36-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-37-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-38-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-39-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-41-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-54-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-55-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-57-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-60-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-66-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-76-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-78-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-81-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-83-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-85-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-87-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-89-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-91-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2740-93-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3324-120-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3324-161-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 37 IoCs
Processes:
resource yara_rule behavioral2/memory/2740-7-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-9-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-10-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-12-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/516-28-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2740-29-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-31-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-18-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-32-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-33-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-34-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-35-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-36-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-37-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-38-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-39-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-41-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-54-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-55-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-57-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-60-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-66-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-76-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-78-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-81-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-83-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-85-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-87-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-89-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-91-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-93-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2740-111-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/516-115-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3324-120-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/4312-160-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3324-161-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/3324-162-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
e5746cd.exee5748ff.exee576234.exee576244.exepid process 2740 e5746cd.exe 516 e5748ff.exe 4312 e576234.exe 3324 e576244.exe -
Processes:
resource yara_rule behavioral2/memory/2740-7-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-9-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-10-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-12-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-29-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-31-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-18-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-32-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-33-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-34-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-35-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-36-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-37-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-38-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-39-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-41-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-54-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-55-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-57-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-60-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-66-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-76-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-78-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-81-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-83-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-85-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-87-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-89-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-91-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2740-93-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/3324-120-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx behavioral2/memory/3324-161-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx -
Processes:
e5746cd.exee576244.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e576244.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5746cd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e576244.exe -
Processes:
e576244.exee5746cd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5746cd.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e5746cd.exee576244.exedescription ioc process File opened (read-only) \??\I: e5746cd.exe File opened (read-only) \??\N: e5746cd.exe File opened (read-only) \??\O: e5746cd.exe File opened (read-only) \??\L: e5746cd.exe File opened (read-only) \??\H: e5746cd.exe File opened (read-only) \??\M: e5746cd.exe File opened (read-only) \??\P: e5746cd.exe File opened (read-only) \??\Q: e5746cd.exe File opened (read-only) \??\E: e576244.exe File opened (read-only) \??\E: e5746cd.exe File opened (read-only) \??\G: e5746cd.exe File opened (read-only) \??\J: e5746cd.exe File opened (read-only) \??\K: e5746cd.exe File opened (read-only) \??\R: e5746cd.exe -
Drops file in Program Files directory 3 IoCs
Processes:
e5746cd.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zFM.exe e5746cd.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e5746cd.exe File opened for modification C:\Program Files\7-Zip\7z.exe e5746cd.exe -
Drops file in Windows directory 3 IoCs
Processes:
e5746cd.exee576244.exedescription ioc process File created C:\Windows\e5747b7 e5746cd.exe File opened for modification C:\Windows\SYSTEM.INI e5746cd.exe File created C:\Windows\e579a2d e576244.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e5746cd.exee576244.exepid process 2740 e5746cd.exe 2740 e5746cd.exe 2740 e5746cd.exe 2740 e5746cd.exe 3324 e576244.exe 3324 e576244.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e5746cd.exedescription pid process Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe Token: SeDebugPrivilege 2740 e5746cd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee5746cd.exee576244.exedescription pid process target process PID 3048 wrote to memory of 972 3048 rundll32.exe rundll32.exe PID 3048 wrote to memory of 972 3048 rundll32.exe rundll32.exe PID 3048 wrote to memory of 972 3048 rundll32.exe rundll32.exe PID 972 wrote to memory of 2740 972 rundll32.exe e5746cd.exe PID 972 wrote to memory of 2740 972 rundll32.exe e5746cd.exe PID 972 wrote to memory of 2740 972 rundll32.exe e5746cd.exe PID 2740 wrote to memory of 792 2740 e5746cd.exe fontdrvhost.exe PID 2740 wrote to memory of 796 2740 e5746cd.exe fontdrvhost.exe PID 2740 wrote to memory of 380 2740 e5746cd.exe dwm.exe PID 2740 wrote to memory of 2812 2740 e5746cd.exe sihost.exe PID 2740 wrote to memory of 2936 2740 e5746cd.exe svchost.exe PID 2740 wrote to memory of 2996 2740 e5746cd.exe taskhostw.exe PID 2740 wrote to memory of 3492 2740 e5746cd.exe Explorer.EXE PID 2740 wrote to memory of 3628 2740 e5746cd.exe svchost.exe PID 2740 wrote to memory of 3836 2740 e5746cd.exe DllHost.exe PID 2740 wrote to memory of 3932 2740 e5746cd.exe StartMenuExperienceHost.exe PID 2740 wrote to memory of 3996 2740 e5746cd.exe RuntimeBroker.exe PID 2740 wrote to memory of 4084 2740 e5746cd.exe SearchApp.exe PID 2740 wrote to memory of 4188 2740 e5746cd.exe RuntimeBroker.exe PID 2740 wrote to memory of 3220 2740 e5746cd.exe TextInputHost.exe PID 2740 wrote to memory of 2284 2740 e5746cd.exe RuntimeBroker.exe PID 2740 wrote to memory of 3048 2740 e5746cd.exe rundll32.exe PID 2740 wrote to memory of 972 2740 e5746cd.exe rundll32.exe PID 2740 wrote to memory of 972 2740 e5746cd.exe rundll32.exe PID 972 wrote to memory of 516 972 rundll32.exe e5748ff.exe PID 972 wrote to memory of 516 972 rundll32.exe e5748ff.exe PID 972 wrote to memory of 516 972 rundll32.exe e5748ff.exe PID 972 wrote to memory of 4312 972 rundll32.exe e576234.exe PID 972 wrote to memory of 4312 972 rundll32.exe e576234.exe PID 972 wrote to memory of 4312 972 rundll32.exe e576234.exe PID 972 wrote to memory of 3324 972 rundll32.exe e576244.exe PID 972 wrote to memory of 3324 972 rundll32.exe e576244.exe PID 972 wrote to memory of 3324 972 rundll32.exe e576244.exe PID 2740 wrote to memory of 792 2740 e5746cd.exe fontdrvhost.exe PID 2740 wrote to memory of 796 2740 e5746cd.exe fontdrvhost.exe PID 2740 wrote to memory of 380 2740 e5746cd.exe dwm.exe PID 2740 wrote to memory of 2812 2740 e5746cd.exe sihost.exe PID 2740 wrote to memory of 2936 2740 e5746cd.exe svchost.exe PID 2740 wrote to memory of 2996 2740 e5746cd.exe taskhostw.exe PID 2740 wrote to memory of 3492 2740 e5746cd.exe Explorer.EXE PID 2740 wrote to memory of 3628 2740 e5746cd.exe svchost.exe PID 2740 wrote to memory of 3836 2740 e5746cd.exe DllHost.exe PID 2740 wrote to memory of 3932 2740 e5746cd.exe StartMenuExperienceHost.exe PID 2740 wrote to memory of 3996 2740 e5746cd.exe RuntimeBroker.exe PID 2740 wrote to memory of 4084 2740 e5746cd.exe SearchApp.exe PID 2740 wrote to memory of 4188 2740 e5746cd.exe RuntimeBroker.exe PID 2740 wrote to memory of 3220 2740 e5746cd.exe TextInputHost.exe PID 2740 wrote to memory of 2284 2740 e5746cd.exe RuntimeBroker.exe PID 2740 wrote to memory of 516 2740 e5746cd.exe e5748ff.exe PID 2740 wrote to memory of 516 2740 e5746cd.exe e5748ff.exe PID 2740 wrote to memory of 4312 2740 e5746cd.exe e576234.exe PID 2740 wrote to memory of 4312 2740 e5746cd.exe e576234.exe PID 2740 wrote to memory of 3324 2740 e5746cd.exe e576244.exe PID 2740 wrote to memory of 3324 2740 e5746cd.exe e576244.exe PID 3324 wrote to memory of 792 3324 e576244.exe fontdrvhost.exe PID 3324 wrote to memory of 796 3324 e576244.exe fontdrvhost.exe PID 3324 wrote to memory of 380 3324 e576244.exe dwm.exe PID 3324 wrote to memory of 2812 3324 e576244.exe sihost.exe PID 3324 wrote to memory of 2936 3324 e576244.exe svchost.exe PID 3324 wrote to memory of 2996 3324 e576244.exe taskhostw.exe PID 3324 wrote to memory of 3492 3324 e576244.exe Explorer.EXE PID 3324 wrote to memory of 3628 3324 e576244.exe svchost.exe PID 3324 wrote to memory of 3836 3324 e576244.exe DllHost.exe PID 3324 wrote to memory of 3932 3324 e576244.exe StartMenuExperienceHost.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e5746cd.exee576244.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5746cd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576244.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fe8ef289ddbd7e28a821d348d599f34eb4fb63063002cdf3824d85790d3a43a.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fe8ef289ddbd7e28a821d348d599f34eb4fb63063002cdf3824d85790d3a43a.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e5746cd.exeC:\Users\Admin\AppData\Local\Temp\e5746cd.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e5748ff.exeC:\Users\Admin\AppData\Local\Temp\e5748ff.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e576234.exeC:\Users\Admin\AppData\Local\Temp\e576234.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e576244.exeC:\Users\Admin\AppData\Local\Temp\e576244.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e5746cd.exeFilesize
97KB
MD56acf5910191a42884f552af40af8a295
SHA1607a36af1a95524d26f65316b8f00f41c5de4611
SHA2569dee3b7c8d94e225d51d1df48627693e7b195a243f688f7ba546168a8b7a2b67
SHA512ecac43cab36dd0534fa295501317050c346488e5b40d6f17a52bca3ad645ca0515c8c1e7fdc02987d8cd61dc2c31acfc4e33b6bb4c0ff3d98dc6eceff60e7eee
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5555c06aa9a0936bd819a1ca552a8ba96
SHA13b109601a6900caa2920890998e501c5aa7d4f2b
SHA2568402508f11f4cb7deecad5957fc2aa099929a7ad2833ebaaeb3a09156ac3bf8a
SHA512d62ff3c32f539d2191fd4896b0d3030c5432e2d5ee5281768795abef515c94d6e0ebb29782e03c99fa457bf21270f1616089cb538a1361a7f6ea2dc999872bb9
-
memory/516-115-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/516-69-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/516-63-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/516-64-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/516-28-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/972-13-0x0000000001490000-0x0000000001492000-memory.dmpFilesize
8KB
-
memory/972-14-0x0000000004990000-0x0000000004991000-memory.dmpFilesize
4KB
-
memory/972-2-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/972-51-0x0000000001490000-0x0000000001492000-memory.dmpFilesize
8KB
-
memory/972-11-0x0000000001490000-0x0000000001492000-memory.dmpFilesize
8KB
-
memory/2740-55-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-66-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-18-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-31-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-29-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-32-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-33-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-34-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-35-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-36-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-37-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-38-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-39-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-41-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-30-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/2740-4-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2740-54-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-19-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/2740-57-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-60-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-12-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-10-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-7-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-26-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/2740-9-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-111-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2740-93-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-91-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-89-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-74-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/2740-87-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-76-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-78-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-81-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-83-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2740-85-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/3324-75-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3324-72-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3324-73-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3324-120-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/3324-161-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/3324-162-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4312-71-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4312-67-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4312-68-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4312-48-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4312-160-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB