Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe
Resource
win7-20240215-en
General
-
Target
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe
-
Size
3.9MB
-
MD5
68ae6ccb3c5a879ea7d350372fe1f637
-
SHA1
fda8df32fac91f400aebc9f1f12fe2b7874c41c4
-
SHA256
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74
-
SHA512
aa8741fba30bfe5a1c6e7fe357d719f67b66c1348f0f6072b2cc96d0b4cccf5f982a0979aa5b46bb2c7a9310d6904cc5f0357ecd6b053b607946704ab6ad7fdc
-
SSDEEP
98304:Yws2ANlKXOaeOgmhIFValfyCwwDK4F0Fc:O0XbeO75OK
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2632-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2632-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2632-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2620-48-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2544-68-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2544-70-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2544-73-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259396231.txt family_gh0strat behavioral1/memory/2632-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2632-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2632-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2632-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2620-48-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2544-68-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2544-70-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2544-73-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatfor.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
R.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259396231.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatfor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
Processes:
R.exeN.exeTXPlatfor.exeTXPlatfor.exeHD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeRemote Data.exepid process 2056 R.exe 2632 N.exe 2620 TXPlatfor.exe 2544 TXPlatfor.exe 2420 HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2180 Remote Data.exe -
Loads dropped DLL 9 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeR.exesvchost.exeTXPlatfor.exeRemote Data.exepid process 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2056 R.exe 1624 svchost.exe 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2620 TXPlatfor.exe 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 1624 svchost.exe 2180 Remote Data.exe -
Processes:
resource yara_rule behavioral1/memory/2824-1-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-4-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-8-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-15-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-16-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-19-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-23-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-24-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-28-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2632-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2632-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2632-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2632-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2824-39-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-40-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2632-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2620-48-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2544-68-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2544-70-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2544-73-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2824-74-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-75-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-76-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-84-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-85-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-86-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-88-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-90-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-94-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-96-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-98-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-99-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-100-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-102-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-104-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-106-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-108-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-110-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-112-0x00000000021A0000-0x000000000322E000-memory.dmp upx behavioral1/memory/2824-118-0x00000000021A0000-0x000000000322E000-memory.dmp upx -
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process File opened (read-only) \??\I: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\T: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\X: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\Z: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\S: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\H: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\J: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\K: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\L: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\O: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\G: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\M: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\N: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\P: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\W: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\Y: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\E: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\Q: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\R: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\U: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened (read-only) \??\V: c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process File opened for modification C:\autorun.inf c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened for modification F:\autorun.inf c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Drops file in System32 directory 6 IoCs
Processes:
R.exesvchost.exeN.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\259396231.txt R.exe -
Drops file in Program Files directory 5 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Drops file in Windows directory 1 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exepid process 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatfor.exepid process 2544 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeN.exeTXPlatfor.exedescription pid process Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeDebugPrivilege 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Token: SeIncBasePriorityPrivilege 2632 N.exe Token: SeLoadDriverPrivilege 2544 TXPlatfor.exe Token: 33 2544 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2544 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeHD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exepid process 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2420 HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe 2420 HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeTXPlatfor.exeN.execmd.exesvchost.exedescription pid process target process PID 2824 wrote to memory of 2056 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe R.exe PID 2824 wrote to memory of 2056 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe R.exe PID 2824 wrote to memory of 2056 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe R.exe PID 2824 wrote to memory of 2056 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe R.exe PID 2824 wrote to memory of 1064 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe Dwm.exe PID 2824 wrote to memory of 2632 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe N.exe PID 2824 wrote to memory of 2632 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe N.exe PID 2824 wrote to memory of 2632 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe N.exe PID 2824 wrote to memory of 2632 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe N.exe PID 2824 wrote to memory of 2632 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe N.exe PID 2824 wrote to memory of 2632 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe N.exe PID 2824 wrote to memory of 2632 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe N.exe PID 2620 wrote to memory of 2544 2620 TXPlatfor.exe TXPlatfor.exe PID 2620 wrote to memory of 2544 2620 TXPlatfor.exe TXPlatfor.exe PID 2620 wrote to memory of 2544 2620 TXPlatfor.exe TXPlatfor.exe PID 2620 wrote to memory of 2544 2620 TXPlatfor.exe TXPlatfor.exe PID 2620 wrote to memory of 2544 2620 TXPlatfor.exe TXPlatfor.exe PID 2620 wrote to memory of 2544 2620 TXPlatfor.exe TXPlatfor.exe PID 2620 wrote to memory of 2544 2620 TXPlatfor.exe TXPlatfor.exe PID 2632 wrote to memory of 2452 2632 N.exe cmd.exe PID 2632 wrote to memory of 2452 2632 N.exe cmd.exe PID 2632 wrote to memory of 2452 2632 N.exe cmd.exe PID 2632 wrote to memory of 2452 2632 N.exe cmd.exe PID 2824 wrote to memory of 2420 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe PID 2824 wrote to memory of 2420 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe PID 2824 wrote to memory of 2420 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe PID 2824 wrote to memory of 2420 2824 c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe PID 2452 wrote to memory of 2808 2452 cmd.exe PING.EXE PID 2452 wrote to memory of 2808 2452 cmd.exe PING.EXE PID 2452 wrote to memory of 2808 2452 cmd.exe PING.EXE PID 2452 wrote to memory of 2808 2452 cmd.exe PING.EXE PID 1624 wrote to memory of 2180 1624 svchost.exe Remote Data.exe PID 1624 wrote to memory of 2180 1624 svchost.exe Remote Data.exe PID 1624 wrote to memory of 2180 1624 svchost.exe Remote Data.exe PID 1624 wrote to memory of 2180 1624 svchost.exe Remote Data.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe"C:\Users\Admin\AppData\Local\Temp\c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeC:\Users\Admin\AppData\Local\Temp\HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259396231.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
7Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0F7669BB_Rar\c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeFilesize
3.9MB
MD5b460f9a898a55bbc6f3bfc7906669425
SHA1e5c8109b55c134e9707707ccbc80bedc410cea1b
SHA25692c4bb6c17cd83c620ed45e8c273319a89e6cd93ef89333d4ba6df326ee60aa7
SHA5122dee9b38c3f68c0ef80605158ebe61abb09ee70942d858dc05862de68568411424ad147a25f1c778f20fe81f3eb437567ba82d5af2b201123a6bf8cc9cb329df
-
C:\Users\Admin\AppData\Local\Temp\HD_c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exeFilesize
1.3MB
MD59af4ff55c1c5aefe42bc22a6283f3c86
SHA1629b290a8ee422211eb513d5fc91efcbb0d0f8ff
SHA256eb9e892b792b8057aba8aa8a012ae18993011e261558e86eac5b5e835bfeb332
SHA5123fd9c94ec4d2ca17b1a360a4d0f878ebc69655b91f645a294fb42908eaf4cae9b2daba2eb0f747b8904a4b77992ecf90666a5d79c2b3ba77127176d331e14f5e
-
C:\Windows\SysWOW64\Remote Data.exeFilesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
C:\viesli.exeFilesize
100KB
MD56d56c17d9225d879df6ac6d3620c7673
SHA1a7cf36521900945e7a90a94c08afecacd4df134a
SHA256bcc98c90a584abde8bbe27aedfec2cf7d614705ea6d1ab253cb01c31054a870f
SHA512706b050a8861a4c1c7bf0abcfd4af45c7bacb61cf74a603fb02c0e93c5ba02f1eb832323f22386e29154afba11724b759c29e6474b66932c148d25019fe5860a
-
\Users\Admin\AppData\Local\Temp\N.exeFilesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
\Users\Admin\AppData\Local\Temp\R.exeFilesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
\Windows\SysWOW64\259396231.txtFilesize
899KB
MD54a61f73a7faca57a57d183a51ab9f9f4
SHA1707abccbce3da5b06cb8fc4e590e9c0559505c5e
SHA256b174d3a954d9acd730dbf6f472fd0b4033de2bd964b701abab3507fae637d55b
SHA512714a5abbf6c03c361e2cf8f5da35142258296cf77743793fe9dbba877e54d9b45d8c710499bb6639a27068a7a6ad1aaec865030615db846d6d251a9d77231364
-
memory/1064-10-0x00000000002B0000-0x00000000002B2000-memory.dmpFilesize
8KB
-
memory/2544-70-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2544-73-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2544-68-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2620-48-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2632-33-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2632-49-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2632-31-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2632-34-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2632-35-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2824-8-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-86-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-40-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-28-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-16-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-15-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-24-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-0-0x0000000000400000-0x00000000006CC000-memory.dmpFilesize
2.8MB
-
memory/2824-23-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-74-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-75-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-76-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-19-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-84-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-85-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-39-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-88-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-90-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-94-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-96-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-98-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-99-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-100-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-102-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-104-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-106-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-108-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-110-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-112-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-4-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-118-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB
-
memory/2824-1-0x00000000021A0000-0x000000000322E000-memory.dmpFilesize
16.6MB