Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe
Resource
win7-20240215-en
General
-
Target
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe
-
Size
2.0MB
-
MD5
f41ad1e9b99154dc5cc1b562c2166ca2
-
SHA1
3de885cc21dfa13fea14cb9d73bab6b09fb2b889
-
SHA256
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b
-
SHA512
49d5ac77e9186b72067c28d6974d0aa1b82b20dc78913296876e04e0e8ced17336600b8b3bd8192053d940202af9feb732b4a38e3006ccafa6fb4856d7147960
-
SSDEEP
49152:47sM3dbEnmZgJH6iADNsNn/3JQErFu/fEHHhF/poL9WpTo5pp9P:hOdbEnMgJaB5mn/3JQf/snXpi9WpToZt
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exepid process 2780 Logo1_.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe.exe upx behavioral2/memory/1520-18-0x0000000000400000-0x00000000006E5000-memory.dmp upx behavioral2/memory/1520-19-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-21-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-22-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-23-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-24-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-25-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-26-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-27-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-28-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-41-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-42-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-44-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-45-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-46-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-48-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-49-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-50-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-52-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-55-0x0000000000400000-0x00000000006E5000-memory.dmp upx behavioral2/memory/1520-53-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-57-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-59-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-62-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-64-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-66-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-68-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-75-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-77-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-87-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-89-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-91-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-94-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-96-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral2/memory/1520-99-0x0000000002600000-0x000000000368E000-memory.dmp upx -
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exeLogo1_.exedescription ioc process File opened (read-only) \??\Y: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\E: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\I: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\H: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\J: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\N: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\S: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\T: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\M: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\O: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\X: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\U: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\V: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\Z: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\R: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\Q: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\K: 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process File opened for modification C:\autorun.inf 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File opened for modification F:\autorun.inf 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\typing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\data\en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notetagsUI\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\Content\Shaders\LoadedModelShaders\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Home\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\libs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.29\MicrosoftEdgeUpdateSetup.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\_desktop.ini Logo1_.exe -
Drops file in Windows directory 5 IoCs
Processes:
Logo1_.exe7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File opened for modification C:\Windows\SYSTEM.INI 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe File created C:\Windows\Logo1_.exe 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
Logo1_.exe7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exepid process 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription pid process Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Token: SeDebugPrivilege 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exepid process 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exeLogo1_.exenet.execmd.exe7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription pid process target process PID 316 wrote to memory of 940 316 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe cmd.exe PID 316 wrote to memory of 940 316 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe cmd.exe PID 316 wrote to memory of 940 316 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe cmd.exe PID 316 wrote to memory of 2780 316 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Logo1_.exe PID 316 wrote to memory of 2780 316 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Logo1_.exe PID 316 wrote to memory of 2780 316 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Logo1_.exe PID 2780 wrote to memory of 1420 2780 Logo1_.exe net.exe PID 2780 wrote to memory of 1420 2780 Logo1_.exe net.exe PID 2780 wrote to memory of 1420 2780 Logo1_.exe net.exe PID 1420 wrote to memory of 2268 1420 net.exe net1.exe PID 1420 wrote to memory of 2268 1420 net.exe net1.exe PID 1420 wrote to memory of 2268 1420 net.exe net1.exe PID 940 wrote to memory of 1520 940 cmd.exe 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe PID 940 wrote to memory of 1520 940 cmd.exe 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe PID 940 wrote to memory of 1520 940 cmd.exe 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe PID 1520 wrote to memory of 792 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe fontdrvhost.exe PID 1520 wrote to memory of 800 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe fontdrvhost.exe PID 1520 wrote to memory of 380 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe dwm.exe PID 1520 wrote to memory of 2636 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe sihost.exe PID 1520 wrote to memory of 2668 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe svchost.exe PID 1520 wrote to memory of 2828 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe taskhostw.exe PID 1520 wrote to memory of 3364 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Explorer.EXE PID 1520 wrote to memory of 3556 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe svchost.exe PID 1520 wrote to memory of 3760 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe DllHost.exe PID 1520 wrote to memory of 3848 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe StartMenuExperienceHost.exe PID 1520 wrote to memory of 3916 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 4008 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe SearchApp.exe PID 1520 wrote to memory of 432 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 4536 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe TextInputHost.exe PID 1520 wrote to memory of 3940 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 4408 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe backgroundTaskHost.exe PID 1520 wrote to memory of 4568 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe backgroundTaskHost.exe PID 1520 wrote to memory of 3144 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe backgroundTaskHost.exe PID 1520 wrote to memory of 940 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe cmd.exe PID 1520 wrote to memory of 940 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe cmd.exe PID 1520 wrote to memory of 2780 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Logo1_.exe PID 1520 wrote to memory of 2780 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Logo1_.exe PID 1520 wrote to memory of 3868 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Conhost.exe PID 2780 wrote to memory of 3364 2780 Logo1_.exe Explorer.EXE PID 2780 wrote to memory of 3364 2780 Logo1_.exe Explorer.EXE PID 1520 wrote to memory of 792 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe fontdrvhost.exe PID 1520 wrote to memory of 800 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe fontdrvhost.exe PID 1520 wrote to memory of 380 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe dwm.exe PID 1520 wrote to memory of 2636 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe sihost.exe PID 1520 wrote to memory of 2668 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe svchost.exe PID 1520 wrote to memory of 2828 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe taskhostw.exe PID 1520 wrote to memory of 3364 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Explorer.EXE PID 1520 wrote to memory of 3556 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe svchost.exe PID 1520 wrote to memory of 3760 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe DllHost.exe PID 1520 wrote to memory of 3848 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe StartMenuExperienceHost.exe PID 1520 wrote to memory of 3916 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 4008 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe SearchApp.exe PID 1520 wrote to memory of 432 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 4536 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe TextInputHost.exe PID 1520 wrote to memory of 3940 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 4408 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe backgroundTaskHost.exe PID 1520 wrote to memory of 4568 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe backgroundTaskHost.exe PID 1520 wrote to memory of 3868 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe Conhost.exe PID 1520 wrote to memory of 2892 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 4448 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe RuntimeBroker.exe PID 1520 wrote to memory of 792 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe fontdrvhost.exe PID 1520 wrote to memory of 800 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe fontdrvhost.exe PID 1520 wrote to memory of 380 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe dwm.exe PID 1520 wrote to memory of 2636 1520 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe sihost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:380
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2668
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2828
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe"C:\Users\Admin\AppData\Local\Temp\7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a33B2.bat3⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe"C:\Users\Admin\AppData\Local\Temp\7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1520 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3556
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3760
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3848
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3916
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4008
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:432
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4536
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3940
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:4408
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4568
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3144
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2892
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4448
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exeFilesize
251KB
MD5977cf1f77316a3972f08a77ce53c3b91
SHA19f041b81a9344226baf41ced0284ec3120ccca45
SHA256291ec6a369034c1b0b53b24a6bcc7521e3aafa10dd286bf7a003a6b3c66c8511
SHA512816477692fdaebc07ce50e71bca986e2d2a2abdfa9edbfaae1dff5d7cb19256bc7408ab7bc6040f684d37ebe1b73397d118045b7f3d0d8e561b89a3b95d5b383
-
C:\Program Files\7-Zip\7z.exeFilesize
570KB
MD530733913ee76b30e772f6495cac46d42
SHA1bf4115aa2519d7f1e2e76c573352ef1588974ea2
SHA256c9da3a226a1e3f90b384c9e85d319a67ebe6278c3d96dde317f33dd267328cce
SHA5122f9b074efe9dac0d43070a7bd340da01834c3242a67c6cfdf8a59016570e8c45edbc4c2c394c2a0ccb1053f456c8a7e37d055cb4eb23de73ac11a565ba2983c2
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exeFilesize
636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
C:\Users\Admin\AppData\Local\Temp\$$a33B2.batFilesize
722B
MD5531352b679b262932a52a5f239534418
SHA1c1dbe40fd1cab4378dd0f3183254823b5afb77b1
SHA256859ab9c349b973b5b4bb90678ca6aa4400a8766d20b5681620f64e4d1d4543dd
SHA512aedaef6c9374a7457e938c8195292f43a1b771db2542b0cca4078a253f0eecc4f0a586c5652beb1f883424958db3088bcbe5a72d5a2024809744594e645e7801
-
C:\Users\Admin\AppData\Local\Temp\7c1454bb85428230d10e8afc863e2207e53cf6aa9c47735dcf18b73d49244a7b.exe.exeFilesize
1.9MB
MD50249e536946ecdee7fc96462981f9051
SHA1f8d57ca34b945114ab12e9d6ab72f798ed9fe101
SHA2563953d9fb50481c4c1ac15d7032a6977551764743f84d94d10f5202be164f00f2
SHA5121893ea7fb7e60a507962ed7efb620478f734f230f1b1f8a6a8541f79dec575dff852b74363048661b9a7de3106593d190846e7edd42da9ba31125fc249497f5d
-
C:\Windows\Logo1_.exeFilesize
26KB
MD5d64fff83fde04bb05f120dc27af13d2b
SHA16637e6000271fa24db8c67a554475eba56911db9
SHA256edb19ce6117ad3b8bcfc38f2076c82e3c5e69a927a5108d442de991bce2d9d84
SHA5125b82e2895823afa819b452cd185bbc8f57b9dbf9e138fcedeeeb7da7871db38e59da651c8def70b157d36f90af8d956283373f8590bbdaaf703ea89b80230d3e
-
F:\$RECYCLE.BIN\S-1-5-21-1132431369-515282257-1998160155-1000\_desktop.iniFilesize
9B
MD55e45e0c42537212b4bfef35112ec91ba
SHA110c59c091fd35facc82bbc96938f118ce5a60546
SHA2569f6b7a83161db36757e96dc40936aec1e5a9a41f9fca089f9cf5a4d695dd5ed5
SHA512ee964e08687daa53fdc8e063402791acb104bd59f5d0f8a6d11d3e889db476315641c38032ade4177cd794b060f9fc4e6fd161989e452aae828c875c747e4bfb
-
F:\ngogcb.pifFilesize
96KB
MD5ec20c9b794072e56d12902d1049f1d99
SHA18277ff58c4c382eea5226feb3161dbe8f32ad3b1
SHA2562ba910ff3f33ffaca53ce9cef0b3ed8a77055a705020a9de4de986c04f22ca0e
SHA5129bc994ed7fc5eeefa5b9e9e9f4665fd2d1c9cfe0487cc19e10243f28c99024f69475610d282926d3085808d02067b6a520f7440a3bf05a4a1d514c4e601931d7
-
memory/316-8-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/316-0-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/940-30-0x00000000009B0000-0x00000000009B1000-memory.dmpFilesize
4KB
-
memory/940-39-0x00000000008F0000-0x00000000008F2000-memory.dmpFilesize
8KB
-
memory/940-37-0x00000000008F0000-0x00000000008F2000-memory.dmpFilesize
8KB
-
memory/940-29-0x00000000008F0000-0x00000000008F2000-memory.dmpFilesize
8KB
-
memory/1520-46-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-53-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-18-0x0000000000400000-0x00000000006E5000-memory.dmpFilesize
2.9MB
-
memory/1520-27-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-26-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-19-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-25-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-38-0x0000000003D70000-0x0000000003D72000-memory.dmpFilesize
8KB
-
memory/1520-36-0x0000000003E90000-0x0000000003E91000-memory.dmpFilesize
4KB
-
memory/1520-21-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-40-0x0000000003D70000-0x0000000003D72000-memory.dmpFilesize
8KB
-
memory/1520-24-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-41-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-42-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-44-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-45-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-23-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-48-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-49-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-50-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-52-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-55-0x0000000000400000-0x00000000006E5000-memory.dmpFilesize
2.9MB
-
memory/1520-99-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-28-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-57-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-59-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-62-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-64-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-66-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-68-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-75-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-77-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-22-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-98-0x0000000003D70000-0x0000000003D72000-memory.dmpFilesize
8KB
-
memory/1520-87-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-89-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-91-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-96-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/1520-94-0x0000000002600000-0x000000000368E000-memory.dmpFilesize
16.6MB
-
memory/2780-92-0x0000000000550000-0x0000000000552000-memory.dmpFilesize
8KB
-
memory/2780-85-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2780-54-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2780-33-0x0000000000550000-0x0000000000552000-memory.dmpFilesize
8KB
-
memory/2780-34-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/2780-32-0x0000000000550000-0x0000000000552000-memory.dmpFilesize
8KB
-
memory/2780-10-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB