Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll
Resource
win7-20240221-en
General
-
Target
7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll
-
Size
120KB
-
MD5
1cb57e9011adee639e4dceed2db5f5d8
-
SHA1
9f8efb90419174a3bd43fdf113d752e2ddd3ad9a
-
SHA256
7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c
-
SHA512
4efddbff561870918f853ecbb131021708c3686c470be06dbb6d3bf6e147be87275779698ac0a729d7fcb843eaaf3c5a29f7101f859dfa1e35d0dbc551c6e777
-
SSDEEP
3072:/dOQMnvHz9JGBmg4xMdRL0Hfn8iAlsbVw:/D8JG94x0RLU8CW
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e5738e2.exee5755ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5738e2.exe -
Processes:
e5738e2.exee5755ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5755ff.exe -
Processes:
e5755ff.exee5738e2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5755ff.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 31 IoCs
Processes:
resource yara_rule behavioral2/memory/4640-6-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-8-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-14-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-22-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-9-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-30-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-31-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-32-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-33-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-34-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-35-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-36-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-37-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-38-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-39-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-41-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-50-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-51-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-53-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-54-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-64-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-66-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-69-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-71-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-74-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-76-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-78-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-80-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-82-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4936-108-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4936-146-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 36 IoCs
Processes:
resource yara_rule behavioral2/memory/4640-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4640-6-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-8-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-14-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-22-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4012-21-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4640-9-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-30-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-31-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-32-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-33-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-34-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-35-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-36-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-37-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-38-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-39-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-41-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-50-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-51-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-53-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-54-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-64-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-66-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-69-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-71-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-74-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-76-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-78-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-80-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-82-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-101-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4012-104-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4936-108-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/4936-146-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/4936-147-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e5738e2.exee573b15.exee5755ff.exepid process 4640 e5738e2.exe 4012 e573b15.exe 4936 e5755ff.exe -
Processes:
resource yara_rule behavioral2/memory/4640-6-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-8-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-14-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-22-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-9-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-30-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-31-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-32-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-33-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-34-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-35-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-36-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-37-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-38-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-39-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-41-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-50-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-51-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-53-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-54-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-64-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-66-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-69-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-71-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-74-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-76-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-78-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-80-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-82-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4936-108-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx behavioral2/memory/4936-146-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx -
Processes:
e5738e2.exee5755ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5755ff.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5738e2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5738e2.exe -
Processes:
e5738e2.exee5755ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5755ff.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e5738e2.exee5755ff.exedescription ioc process File opened (read-only) \??\Q: e5738e2.exe File opened (read-only) \??\G: e5738e2.exe File opened (read-only) \??\I: e5738e2.exe File opened (read-only) \??\J: e5738e2.exe File opened (read-only) \??\N: e5738e2.exe File opened (read-only) \??\O: e5738e2.exe File opened (read-only) \??\E: e5738e2.exe File opened (read-only) \??\L: e5738e2.exe File opened (read-only) \??\P: e5738e2.exe File opened (read-only) \??\H: e5738e2.exe File opened (read-only) \??\K: e5738e2.exe File opened (read-only) \??\E: e5755ff.exe File opened (read-only) \??\M: e5738e2.exe File opened (read-only) \??\R: e5738e2.exe -
Drops file in Program Files directory 4 IoCs
Processes:
e5738e2.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e5738e2.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e5738e2.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e5738e2.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e5738e2.exe -
Drops file in Windows directory 3 IoCs
Processes:
e5738e2.exee5755ff.exedescription ioc process File created C:\Windows\e57397f e5738e2.exe File opened for modification C:\Windows\SYSTEM.INI e5738e2.exe File created C:\Windows\e578c61 e5755ff.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e5738e2.exee5755ff.exepid process 4640 e5738e2.exe 4640 e5738e2.exe 4640 e5738e2.exe 4640 e5738e2.exe 4936 e5755ff.exe 4936 e5755ff.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e5738e2.exedescription pid process Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee5738e2.exee5755ff.exedescription pid process target process PID 2516 wrote to memory of 4776 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 4776 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 4776 2516 rundll32.exe rundll32.exe PID 4776 wrote to memory of 4640 4776 rundll32.exe e5738e2.exe PID 4776 wrote to memory of 4640 4776 rundll32.exe e5738e2.exe PID 4776 wrote to memory of 4640 4776 rundll32.exe e5738e2.exe PID 4640 wrote to memory of 776 4640 e5738e2.exe fontdrvhost.exe PID 4640 wrote to memory of 784 4640 e5738e2.exe fontdrvhost.exe PID 4640 wrote to memory of 316 4640 e5738e2.exe dwm.exe PID 4640 wrote to memory of 2624 4640 e5738e2.exe sihost.exe PID 4640 wrote to memory of 2656 4640 e5738e2.exe svchost.exe PID 4640 wrote to memory of 2824 4640 e5738e2.exe taskhostw.exe PID 4640 wrote to memory of 3500 4640 e5738e2.exe Explorer.EXE PID 4640 wrote to memory of 3652 4640 e5738e2.exe svchost.exe PID 4640 wrote to memory of 3844 4640 e5738e2.exe DllHost.exe PID 4640 wrote to memory of 3960 4640 e5738e2.exe StartMenuExperienceHost.exe PID 4640 wrote to memory of 4028 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 680 4640 e5738e2.exe SearchApp.exe PID 4640 wrote to memory of 1096 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 4168 4640 e5738e2.exe TextInputHost.exe PID 4640 wrote to memory of 3236 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 1640 4640 e5738e2.exe backgroundTaskHost.exe PID 4640 wrote to memory of 2944 4640 e5738e2.exe backgroundTaskHost.exe PID 4640 wrote to memory of 2500 4640 e5738e2.exe backgroundTaskHost.exe PID 4640 wrote to memory of 2516 4640 e5738e2.exe rundll32.exe PID 4640 wrote to memory of 4776 4640 e5738e2.exe rundll32.exe PID 4640 wrote to memory of 4776 4640 e5738e2.exe rundll32.exe PID 4776 wrote to memory of 4012 4776 rundll32.exe e573b15.exe PID 4776 wrote to memory of 4012 4776 rundll32.exe e573b15.exe PID 4776 wrote to memory of 4012 4776 rundll32.exe e573b15.exe PID 4776 wrote to memory of 4936 4776 rundll32.exe e5755ff.exe PID 4776 wrote to memory of 4936 4776 rundll32.exe e5755ff.exe PID 4776 wrote to memory of 4936 4776 rundll32.exe e5755ff.exe PID 4640 wrote to memory of 776 4640 e5738e2.exe fontdrvhost.exe PID 4640 wrote to memory of 784 4640 e5738e2.exe fontdrvhost.exe PID 4640 wrote to memory of 316 4640 e5738e2.exe dwm.exe PID 4640 wrote to memory of 2624 4640 e5738e2.exe sihost.exe PID 4640 wrote to memory of 2656 4640 e5738e2.exe svchost.exe PID 4640 wrote to memory of 2824 4640 e5738e2.exe taskhostw.exe PID 4640 wrote to memory of 3500 4640 e5738e2.exe Explorer.EXE PID 4640 wrote to memory of 3652 4640 e5738e2.exe svchost.exe PID 4640 wrote to memory of 3844 4640 e5738e2.exe DllHost.exe PID 4640 wrote to memory of 3960 4640 e5738e2.exe StartMenuExperienceHost.exe PID 4640 wrote to memory of 4028 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 680 4640 e5738e2.exe SearchApp.exe PID 4640 wrote to memory of 1096 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 4168 4640 e5738e2.exe TextInputHost.exe PID 4640 wrote to memory of 3236 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 1640 4640 e5738e2.exe backgroundTaskHost.exe PID 4640 wrote to memory of 2944 4640 e5738e2.exe backgroundTaskHost.exe PID 4640 wrote to memory of 4012 4640 e5738e2.exe e573b15.exe PID 4640 wrote to memory of 4012 4640 e5738e2.exe e573b15.exe PID 4640 wrote to memory of 4692 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 3408 4640 e5738e2.exe RuntimeBroker.exe PID 4640 wrote to memory of 4936 4640 e5738e2.exe e5755ff.exe PID 4640 wrote to memory of 4936 4640 e5738e2.exe e5755ff.exe PID 4936 wrote to memory of 776 4936 e5755ff.exe fontdrvhost.exe PID 4936 wrote to memory of 784 4936 e5755ff.exe fontdrvhost.exe PID 4936 wrote to memory of 316 4936 e5755ff.exe dwm.exe PID 4936 wrote to memory of 2624 4936 e5755ff.exe sihost.exe PID 4936 wrote to memory of 2656 4936 e5755ff.exe svchost.exe PID 4936 wrote to memory of 2824 4936 e5755ff.exe taskhostw.exe PID 4936 wrote to memory of 3500 4936 e5755ff.exe Explorer.EXE PID 4936 wrote to memory of 3652 4936 e5755ff.exe svchost.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e5738e2.exee5755ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5755ff.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2656
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2824
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\e5738e2.exeC:\Users\Admin\AppData\Local\Temp\e5738e2.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\e573b15.exeC:\Users\Admin\AppData\Local\Temp\e573b15.exe4⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\e5755ff.exeC:\Users\Admin\AppData\Local\Temp\e5755ff.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3844
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3960
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4028
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:680
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1096
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4168
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3236
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:1640
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2944
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2500
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e5738e2.exeFilesize
97KB
MD50bf23bdb7fb6d2c05e5ce88fa833c649
SHA1864616908b77a43bacf6fa0bfaab7031852608a9
SHA256dc71527fbe43fc9af65512f29662cc208539f0dd46e7f0d5036a84742a13299d
SHA51258a053c82236c6268f6f55cc7bd8546a28c2d1c060f7226c90b8be6c2c676d8cfb03e449a152e42b7e081362e8ef9f351342642a1a2584dd170ef7e14d2ef168
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5e760fdd34722fa63cb8e4f6f4137f9df
SHA1d70b14398c382c994c7c225f7dd87c58ad69b24f
SHA256cce4a14b54cbde9740a852428b716a9e282f2db59e4f89bfa70344f275df6ca8
SHA51268f6f5ec7107c8d0ec9ba25cda43cdc13e1e564d2b4c10ccdd3b7e93cd6633625ba229fb7ca4a19a753a8873cef7e1a074dbea3e0ceee657a04939fe52dd8a67
-
memory/4012-21-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4012-104-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4012-59-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4012-56-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4012-57-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4640-71-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-54-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-22-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-24-0x00000000004E0000-0x00000000004E2000-memory.dmpFilesize
8KB
-
memory/4640-14-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-9-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4640-30-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-31-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-32-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-33-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-34-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-35-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-36-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-37-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-38-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-39-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-41-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-101-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4640-82-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-50-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-51-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-53-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-80-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-20-0x00000000004F0000-0x00000000004F1000-memory.dmpFilesize
4KB
-
memory/4640-78-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-8-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-76-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-74-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-64-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-66-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-69-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-6-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/4640-73-0x00000000004E0000-0x00000000004E2000-memory.dmpFilesize
8KB
-
memory/4776-13-0x0000000000800000-0x0000000000802000-memory.dmpFilesize
8KB
-
memory/4776-12-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/4776-48-0x0000000000800000-0x0000000000802000-memory.dmpFilesize
8KB
-
memory/4776-10-0x0000000000800000-0x0000000000802000-memory.dmpFilesize
8KB
-
memory/4776-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/4936-60-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4936-63-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4936-46-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4936-108-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/4936-146-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/4936-147-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB