Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll
Resource
win7-20240221-en
General
-
Target
7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll
-
Size
120KB
-
MD5
1cb57e9011adee639e4dceed2db5f5d8
-
SHA1
9f8efb90419174a3bd43fdf113d752e2ddd3ad9a
-
SHA256
7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c
-
SHA512
4efddbff561870918f853ecbb131021708c3686c470be06dbb6d3bf6e147be87275779698ac0a729d7fcb843eaaf3c5a29f7101f859dfa1e35d0dbc551c6e777
-
SSDEEP
3072:/dOQMnvHz9JGBmg4xMdRL0Hfn8iAlsbVw:/D8JG94x0RLU8CW
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5738e2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5755ff.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5755ff.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 31 IoCs
resource yara_rule behavioral2/memory/4640-6-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-8-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-14-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-22-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-9-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-30-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-31-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-32-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-33-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-34-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-35-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-36-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-37-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-38-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-39-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-41-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-50-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-51-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-53-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-54-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-64-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-66-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-69-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-71-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-74-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-76-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-78-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-80-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4640-82-0x00000000007E0000-0x000000000189A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4936-108-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4936-146-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 36 IoCs
resource yara_rule behavioral2/memory/4640-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4640-6-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-8-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-14-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-22-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4012-21-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4640-9-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-30-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-31-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-32-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-33-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-34-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-35-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-36-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-37-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-38-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-39-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-41-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-50-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-51-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-53-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-54-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-64-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-66-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-69-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-71-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-74-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-76-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-78-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-80-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-82-0x00000000007E0000-0x000000000189A000-memory.dmp UPX behavioral2/memory/4640-101-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4012-104-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4936-108-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/4936-146-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/4936-147-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
pid Process 4640 e5738e2.exe 4012 e573b15.exe 4936 e5755ff.exe -
resource yara_rule behavioral2/memory/4640-6-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-8-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-14-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-22-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-9-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-30-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-31-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-32-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-33-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-34-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-35-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-36-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-37-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-38-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-39-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-41-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-50-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-51-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-53-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-54-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-64-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-66-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-69-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-71-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-74-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-76-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-78-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-80-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4640-82-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4936-108-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx behavioral2/memory/4936-146-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5755ff.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5738e2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5755ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5738e2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5755ff.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: e5738e2.exe File opened (read-only) \??\G: e5738e2.exe File opened (read-only) \??\I: e5738e2.exe File opened (read-only) \??\J: e5738e2.exe File opened (read-only) \??\N: e5738e2.exe File opened (read-only) \??\O: e5738e2.exe File opened (read-only) \??\E: e5738e2.exe File opened (read-only) \??\L: e5738e2.exe File opened (read-only) \??\P: e5738e2.exe File opened (read-only) \??\H: e5738e2.exe File opened (read-only) \??\K: e5738e2.exe File opened (read-only) \??\E: e5755ff.exe File opened (read-only) \??\M: e5738e2.exe File opened (read-only) \??\R: e5738e2.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe e5738e2.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e5738e2.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e5738e2.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e5738e2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\e57397f e5738e2.exe File opened for modification C:\Windows\SYSTEM.INI e5738e2.exe File created C:\Windows\e578c61 e5755ff.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4640 e5738e2.exe 4640 e5738e2.exe 4640 e5738e2.exe 4640 e5738e2.exe 4936 e5755ff.exe 4936 e5755ff.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe Token: SeDebugPrivilege 4640 e5738e2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4776 2516 rundll32.exe 84 PID 2516 wrote to memory of 4776 2516 rundll32.exe 84 PID 2516 wrote to memory of 4776 2516 rundll32.exe 84 PID 4776 wrote to memory of 4640 4776 rundll32.exe 85 PID 4776 wrote to memory of 4640 4776 rundll32.exe 85 PID 4776 wrote to memory of 4640 4776 rundll32.exe 85 PID 4640 wrote to memory of 776 4640 e5738e2.exe 8 PID 4640 wrote to memory of 784 4640 e5738e2.exe 9 PID 4640 wrote to memory of 316 4640 e5738e2.exe 13 PID 4640 wrote to memory of 2624 4640 e5738e2.exe 44 PID 4640 wrote to memory of 2656 4640 e5738e2.exe 45 PID 4640 wrote to memory of 2824 4640 e5738e2.exe 48 PID 4640 wrote to memory of 3500 4640 e5738e2.exe 56 PID 4640 wrote to memory of 3652 4640 e5738e2.exe 57 PID 4640 wrote to memory of 3844 4640 e5738e2.exe 58 PID 4640 wrote to memory of 3960 4640 e5738e2.exe 59 PID 4640 wrote to memory of 4028 4640 e5738e2.exe 60 PID 4640 wrote to memory of 680 4640 e5738e2.exe 61 PID 4640 wrote to memory of 1096 4640 e5738e2.exe 62 PID 4640 wrote to memory of 4168 4640 e5738e2.exe 73 PID 4640 wrote to memory of 3236 4640 e5738e2.exe 74 PID 4640 wrote to memory of 1640 4640 e5738e2.exe 79 PID 4640 wrote to memory of 2944 4640 e5738e2.exe 80 PID 4640 wrote to memory of 2500 4640 e5738e2.exe 81 PID 4640 wrote to memory of 2516 4640 e5738e2.exe 83 PID 4640 wrote to memory of 4776 4640 e5738e2.exe 84 PID 4640 wrote to memory of 4776 4640 e5738e2.exe 84 PID 4776 wrote to memory of 4012 4776 rundll32.exe 86 PID 4776 wrote to memory of 4012 4776 rundll32.exe 86 PID 4776 wrote to memory of 4012 4776 rundll32.exe 86 PID 4776 wrote to memory of 4936 4776 rundll32.exe 97 PID 4776 wrote to memory of 4936 4776 rundll32.exe 97 PID 4776 wrote to memory of 4936 4776 rundll32.exe 97 PID 4640 wrote to memory of 776 4640 e5738e2.exe 8 PID 4640 wrote to memory of 784 4640 e5738e2.exe 9 PID 4640 wrote to memory of 316 4640 e5738e2.exe 13 PID 4640 wrote to memory of 2624 4640 e5738e2.exe 44 PID 4640 wrote to memory of 2656 4640 e5738e2.exe 45 PID 4640 wrote to memory of 2824 4640 e5738e2.exe 48 PID 4640 wrote to memory of 3500 4640 e5738e2.exe 56 PID 4640 wrote to memory of 3652 4640 e5738e2.exe 57 PID 4640 wrote to memory of 3844 4640 e5738e2.exe 58 PID 4640 wrote to memory of 3960 4640 e5738e2.exe 59 PID 4640 wrote to memory of 4028 4640 e5738e2.exe 60 PID 4640 wrote to memory of 680 4640 e5738e2.exe 61 PID 4640 wrote to memory of 1096 4640 e5738e2.exe 62 PID 4640 wrote to memory of 4168 4640 e5738e2.exe 73 PID 4640 wrote to memory of 3236 4640 e5738e2.exe 74 PID 4640 wrote to memory of 1640 4640 e5738e2.exe 79 PID 4640 wrote to memory of 2944 4640 e5738e2.exe 80 PID 4640 wrote to memory of 4012 4640 e5738e2.exe 86 PID 4640 wrote to memory of 4012 4640 e5738e2.exe 86 PID 4640 wrote to memory of 4692 4640 e5738e2.exe 89 PID 4640 wrote to memory of 3408 4640 e5738e2.exe 90 PID 4640 wrote to memory of 4936 4640 e5738e2.exe 97 PID 4640 wrote to memory of 4936 4640 e5738e2.exe 97 PID 4936 wrote to memory of 776 4936 e5755ff.exe 8 PID 4936 wrote to memory of 784 4936 e5755ff.exe 9 PID 4936 wrote to memory of 316 4936 e5755ff.exe 13 PID 4936 wrote to memory of 2624 4936 e5755ff.exe 44 PID 4936 wrote to memory of 2656 4936 e5755ff.exe 45 PID 4936 wrote to memory of 2824 4936 e5755ff.exe 48 PID 4936 wrote to memory of 3500 4936 e5755ff.exe 56 PID 4936 wrote to memory of 3652 4936 e5755ff.exe 57 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5738e2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5755ff.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2656
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2824
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f898440d5ac3774e6276842eebf3455baf9b6421c022009f60214418df7ff5c.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\e5738e2.exeC:\Users\Admin\AppData\Local\Temp\e5738e2.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\e573b15.exeC:\Users\Admin\AppData\Local\Temp\e573b15.exe4⤵
- Executes dropped EXE
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\e5755ff.exeC:\Users\Admin\AppData\Local\Temp\e5755ff.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4936
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3844
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3960
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4028
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:680
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1096
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4168
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3236
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:1640
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2944
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2500
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD50bf23bdb7fb6d2c05e5ce88fa833c649
SHA1864616908b77a43bacf6fa0bfaab7031852608a9
SHA256dc71527fbe43fc9af65512f29662cc208539f0dd46e7f0d5036a84742a13299d
SHA51258a053c82236c6268f6f55cc7bd8546a28c2d1c060f7226c90b8be6c2c676d8cfb03e449a152e42b7e081362e8ef9f351342642a1a2584dd170ef7e14d2ef168
-
Filesize
257B
MD5e760fdd34722fa63cb8e4f6f4137f9df
SHA1d70b14398c382c994c7c225f7dd87c58ad69b24f
SHA256cce4a14b54cbde9740a852428b716a9e282f2db59e4f89bfa70344f275df6ca8
SHA51268f6f5ec7107c8d0ec9ba25cda43cdc13e1e564d2b4c10ccdd3b7e93cd6633625ba229fb7ca4a19a753a8873cef7e1a074dbea3e0ceee657a04939fe52dd8a67