Analysis
-
max time kernel
27s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 08:54
Behavioral task
behavioral1
Sample
6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe
Resource
win7-20240221-en
General
-
Target
6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe
-
Size
1.6MB
-
MD5
9af05bfe96a5bcbf2353e154014a6b81
-
SHA1
e55ddf419cd7b6ed7cd819e9bf9398ef05b91991
-
SHA256
6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df
-
SHA512
958195681abd47140c65cb97be1ab3895f6446fcbecbcbf45b714d1ba30d2440a5dd7151ae17c80d468bfacb5ab7ff139a311201aa488b92e91ad4547af3a2c4
-
SSDEEP
49152:0t8MGGGN/DJAyC4yHJvu/wRwAjGeRj50:q8MGGGZlAyCPVuM+
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000002325f-54.dat acprotect -
resource yara_rule behavioral2/memory/2920-0-0x0000000000400000-0x0000000000778000-memory.dmp upx behavioral2/memory/2920-1-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-3-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-4-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-8-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-9-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-10-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-11-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-12-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-13-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-14-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-15-0x0000000000400000-0x0000000000778000-memory.dmp upx behavioral2/memory/2920-22-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-23-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-24-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-25-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-26-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-29-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-31-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-37-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-38-0x0000000000400000-0x0000000000778000-memory.dmp upx behavioral2/memory/2920-44-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-48-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/4560-58-0x0000000072F80000-0x000000007303A000-memory.dmp upx behavioral2/files/0x000700000002325f-54.dat upx behavioral2/memory/2920-67-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-87-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-93-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-101-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-103-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-105-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-107-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/4560-109-0x0000000072F80000-0x000000007303A000-memory.dmp upx behavioral2/memory/2920-110-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-112-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-114-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-117-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-119-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-122-0x0000000002660000-0x000000000371A000-memory.dmp upx behavioral2/memory/2920-124-0x0000000002660000-0x000000000371A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe File opened (read-only) \??\G: 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\e57e5eb 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe File opened for modification C:\Windows\SYSTEM.INI 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe Token: SeDebugPrivilege 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2920 wrote to memory of 792 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 9 PID 2920 wrote to memory of 796 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 10 PID 2920 wrote to memory of 316 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 13 PID 2920 wrote to memory of 2376 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 42 PID 2920 wrote to memory of 2404 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 43 PID 2920 wrote to memory of 2520 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 46 PID 2920 wrote to memory of 3156 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 57 PID 2920 wrote to memory of 3484 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 58 PID 2920 wrote to memory of 3692 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 59 PID 2920 wrote to memory of 3792 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 60 PID 2920 wrote to memory of 3928 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 61 PID 2920 wrote to memory of 4012 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 62 PID 2920 wrote to memory of 3864 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 63 PID 2920 wrote to memory of 4320 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 65 PID 2920 wrote to memory of 4976 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 76 PID 2920 wrote to memory of 2132 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 78 PID 2920 wrote to memory of 2352 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 79 PID 2920 wrote to memory of 4028 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 80 PID 2920 wrote to memory of 1828 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 81 PID 2920 wrote to memory of 4160 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 82 PID 2920 wrote to memory of 452 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 84 PID 2920 wrote to memory of 3336 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 85 PID 2920 wrote to memory of 792 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 9 PID 2920 wrote to memory of 796 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 10 PID 2920 wrote to memory of 316 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 13 PID 2920 wrote to memory of 2376 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 42 PID 2920 wrote to memory of 2404 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 43 PID 2920 wrote to memory of 2520 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 46 PID 2920 wrote to memory of 3156 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 57 PID 2920 wrote to memory of 3484 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 58 PID 2920 wrote to memory of 3692 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 59 PID 2920 wrote to memory of 3792 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 60 PID 2920 wrote to memory of 3928 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 61 PID 2920 wrote to memory of 4012 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 62 PID 2920 wrote to memory of 3864 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 63 PID 2920 wrote to memory of 4320 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 65 PID 2920 wrote to memory of 4976 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 76 PID 2920 wrote to memory of 2132 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 78 PID 2920 wrote to memory of 2352 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 79 PID 2920 wrote to memory of 4028 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 80 PID 2920 wrote to memory of 1828 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 81 PID 2920 wrote to memory of 4160 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 82 PID 2920 wrote to memory of 452 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 84 PID 2920 wrote to memory of 3336 2920 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe 85 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:796
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2404
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2520
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe"C:\Users\Admin\AppData\Local\Temp\6bbf7cfc33e88a075485839faf5141b6202b79ac1668b40a3a2cdd9e98c875df.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2920 -
C:\Users\Admin\Downloads\ToDesk_Setup.exe"C:\Users\Admin\Downloads\ToDesk_Setup.exe"3⤵PID:4560
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3484
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3692
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3792
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4012
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3864
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4320
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:2132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2b4,0x7ffdb24e2e98,0x7ffdb24e2ea4,0x7ffdb24e2eb02⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2268 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3228 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:32⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3336 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5396 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5524 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3836 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:82⤵PID:4660
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3
-
Filesize
287KB
MD5bb0cdff5ac2d64723007a0b4f7962a02
SHA1410889522ee8ea7308b054f71bc4cab078295e06
SHA25633e460a080a621cda7896e96b6f1beee802b485cf99e18b27463cd362c484b08
SHA512b4dc2614f01f5f01d5dec9e6a41e072d01e924d8a94ac0dc1050399fd1dc3cc8d53d7ccf162d750d166fca200771b0850191b30c7caada8edea9ba6d686e2402
-
Filesize
733KB
MD52151819d6b259d54a8ef2b1bec0c3f99
SHA1b3e3cf9ab831356c5dd5252706ff4d5b719d1fd7
SHA2561f81de1b4f32c6547b35f3361bbc3408e373c1031338023f397fbd96f078f8d9
SHA5125845a37bfdbe6666437d384897e10de1031dd63d586907f99f65c9bbee5ad7fad5cb74a2ab429655bce6c890401d6d4bb50988a094b09eca66a00d262fc569c1
-
Filesize
5.8MB
MD5280a2745eeae0486ff296e424e07f28f
SHA1a7a2ba291d26cb0254baa0d6f5a8142d05270bd3
SHA25694e2e12b593bd628bb833b7d498d8ba650beff0fdbdb184387a0a563ac083dd1
SHA5128f3d19cf67bb0be2f62a8ef532c430c6a8a8e20928c2b1c3fb3899593a7f353e632f9c00122ced3f5122ea9ff500df2d8d2399064d320de770eb1f6bf29eab66
-
Filesize
9.3MB
MD519e943b21578ca701268c86bbe6deb85
SHA133438183a9cc14f2b158a38003eeb7a7c2731aeb
SHA2561c22cbe761ed6d0956b20c93c059f2915223d0bdeb072485d66492dce419a399
SHA512c20bb521d43c91a575c1939a54d7f07e446fab9f6b2d5bd37adcf8e906cc3595fee3567016ab4ee35874ec18f3e6abe65e292d19d7519b541d4e168d476501a0
-
Filesize
97KB
MD56a67fa330011c1deea9ce8732cc25ce8
SHA1c220304be0674f578a788d7a6e390b40b4073bd4
SHA256113652b32f5a0828f13f4ae246b0d6977131099fa2dd36cc81215bce2abb6596
SHA512c181d500d264be0225a71a119d6fa11cdffcffcb6b567598ce495e5a2f8590971de7cd9a0da70129b01ba3fb7399201d83e1145e661a812a81c3e08bc94b7414