Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
a9ccebb790c8db6f93d51b5a06adf1d0_NeikiAnalytics.dll
Resource
win7-20240215-en
General
-
Target
a9ccebb790c8db6f93d51b5a06adf1d0_NeikiAnalytics.dll
-
Size
120KB
-
MD5
a9ccebb790c8db6f93d51b5a06adf1d0
-
SHA1
d8f36ec5c3336c4b93552ccd9ac59854216bd84e
-
SHA256
a31a593b4055f57797d4ff318e7d9adada273cb6c6a3d523ed54b1ef83139e5f
-
SHA512
07f04ebed8658b9cd574d64376680e5c4ab3eaefde9fff0f2e08a5afd6ed9b68ede80c339df24dad9ab88eaeeb82e1623a1b17dee25909ff8bbd8da0fb5be2a9
-
SSDEEP
1536:sXTyBHqGfvy71uiKh09QtQ5rEZ9pn4uNcxb0Zo2O2XCIs7e0Cw79+mUwxMAM:smBtc1uimFtQ5oHp42WyCoCIsiojG
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e57dfa2.exee580913.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e580913.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e580913.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57dfa2.exe -
Processes:
e57dfa2.exee580913.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e580913.exe -
Processes:
e580913.exee57dfa2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e580913.exe -
Executes dropped EXE 3 IoCs
Processes:
e57dfa2.exee57e09c.exee580913.exepid process 4056 e57dfa2.exe 4192 e57e09c.exe 3996 e580913.exe -
Processes:
resource yara_rule behavioral2/memory/4056-6-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-9-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-8-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-10-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-11-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-24-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-25-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-34-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-32-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-28-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-35-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-36-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-37-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-38-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-40-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-39-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-54-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-55-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-56-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-58-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-60-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-61-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-63-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-65-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-67-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4056-69-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/3996-104-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/3996-147-0x0000000000790000-0x000000000184A000-memory.dmp upx -
Processes:
e57dfa2.exee580913.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57dfa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e580913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e580913.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e580913.exe -
Processes:
e57dfa2.exee580913.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e580913.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e57dfa2.exee580913.exedescription ioc process File opened (read-only) \??\M: e57dfa2.exe File opened (read-only) \??\E: e580913.exe File opened (read-only) \??\G: e580913.exe File opened (read-only) \??\J: e580913.exe File opened (read-only) \??\H: e57dfa2.exe File opened (read-only) \??\I: e57dfa2.exe File opened (read-only) \??\N: e57dfa2.exe File opened (read-only) \??\H: e580913.exe File opened (read-only) \??\I: e580913.exe File opened (read-only) \??\J: e57dfa2.exe File opened (read-only) \??\K: e57dfa2.exe File opened (read-only) \??\L: e57dfa2.exe File opened (read-only) \??\E: e57dfa2.exe File opened (read-only) \??\G: e57dfa2.exe -
Drops file in Windows directory 3 IoCs
Processes:
e57dfa2.exee580913.exedescription ioc process File created C:\Windows\e57e000 e57dfa2.exe File opened for modification C:\Windows\SYSTEM.INI e57dfa2.exe File created C:\Windows\e583071 e580913.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e57dfa2.exee580913.exepid process 4056 e57dfa2.exe 4056 e57dfa2.exe 4056 e57dfa2.exe 4056 e57dfa2.exe 3996 e580913.exe 3996 e580913.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e57dfa2.exedescription pid process Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe Token: SeDebugPrivilege 4056 e57dfa2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee57dfa2.exee580913.exedescription pid process target process PID 860 wrote to memory of 408 860 rundll32.exe rundll32.exe PID 860 wrote to memory of 408 860 rundll32.exe rundll32.exe PID 860 wrote to memory of 408 860 rundll32.exe rundll32.exe PID 408 wrote to memory of 4056 408 rundll32.exe e57dfa2.exe PID 408 wrote to memory of 4056 408 rundll32.exe e57dfa2.exe PID 408 wrote to memory of 4056 408 rundll32.exe e57dfa2.exe PID 4056 wrote to memory of 784 4056 e57dfa2.exe fontdrvhost.exe PID 4056 wrote to memory of 792 4056 e57dfa2.exe fontdrvhost.exe PID 4056 wrote to memory of 64 4056 e57dfa2.exe dwm.exe PID 4056 wrote to memory of 2604 4056 e57dfa2.exe sihost.exe PID 4056 wrote to memory of 2664 4056 e57dfa2.exe svchost.exe PID 4056 wrote to memory of 2780 4056 e57dfa2.exe taskhostw.exe PID 4056 wrote to memory of 3476 4056 e57dfa2.exe Explorer.EXE PID 4056 wrote to memory of 3600 4056 e57dfa2.exe svchost.exe PID 4056 wrote to memory of 3800 4056 e57dfa2.exe DllHost.exe PID 4056 wrote to memory of 3892 4056 e57dfa2.exe StartMenuExperienceHost.exe PID 4056 wrote to memory of 3956 4056 e57dfa2.exe RuntimeBroker.exe PID 4056 wrote to memory of 4044 4056 e57dfa2.exe SearchApp.exe PID 4056 wrote to memory of 3492 4056 e57dfa2.exe RuntimeBroker.exe PID 4056 wrote to memory of 4428 4056 e57dfa2.exe RuntimeBroker.exe PID 4056 wrote to memory of 2256 4056 e57dfa2.exe TextInputHost.exe PID 4056 wrote to memory of 4672 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 3948 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 1924 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 3088 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 2092 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 2020 4056 e57dfa2.exe backgroundTaskHost.exe PID 4056 wrote to memory of 3084 4056 e57dfa2.exe backgroundTaskHost.exe PID 4056 wrote to memory of 860 4056 e57dfa2.exe rundll32.exe PID 4056 wrote to memory of 408 4056 e57dfa2.exe rundll32.exe PID 4056 wrote to memory of 408 4056 e57dfa2.exe rundll32.exe PID 408 wrote to memory of 4192 408 rundll32.exe e57e09c.exe PID 408 wrote to memory of 4192 408 rundll32.exe e57e09c.exe PID 408 wrote to memory of 4192 408 rundll32.exe e57e09c.exe PID 4056 wrote to memory of 784 4056 e57dfa2.exe fontdrvhost.exe PID 4056 wrote to memory of 792 4056 e57dfa2.exe fontdrvhost.exe PID 4056 wrote to memory of 64 4056 e57dfa2.exe dwm.exe PID 4056 wrote to memory of 2604 4056 e57dfa2.exe sihost.exe PID 4056 wrote to memory of 2664 4056 e57dfa2.exe svchost.exe PID 4056 wrote to memory of 2780 4056 e57dfa2.exe taskhostw.exe PID 4056 wrote to memory of 3476 4056 e57dfa2.exe Explorer.EXE PID 4056 wrote to memory of 3600 4056 e57dfa2.exe svchost.exe PID 4056 wrote to memory of 3800 4056 e57dfa2.exe DllHost.exe PID 4056 wrote to memory of 3892 4056 e57dfa2.exe StartMenuExperienceHost.exe PID 4056 wrote to memory of 3956 4056 e57dfa2.exe RuntimeBroker.exe PID 4056 wrote to memory of 4044 4056 e57dfa2.exe SearchApp.exe PID 4056 wrote to memory of 3492 4056 e57dfa2.exe RuntimeBroker.exe PID 4056 wrote to memory of 4428 4056 e57dfa2.exe RuntimeBroker.exe PID 4056 wrote to memory of 2256 4056 e57dfa2.exe TextInputHost.exe PID 4056 wrote to memory of 4672 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 3948 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 1924 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 3088 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 2092 4056 e57dfa2.exe msedge.exe PID 4056 wrote to memory of 2020 4056 e57dfa2.exe backgroundTaskHost.exe PID 4056 wrote to memory of 3084 4056 e57dfa2.exe backgroundTaskHost.exe PID 4056 wrote to memory of 860 4056 e57dfa2.exe rundll32.exe PID 4056 wrote to memory of 4192 4056 e57dfa2.exe e57e09c.exe PID 4056 wrote to memory of 4192 4056 e57dfa2.exe e57e09c.exe PID 4056 wrote to memory of 1656 4056 e57dfa2.exe msedge.exe PID 408 wrote to memory of 3996 408 rundll32.exe e580913.exe PID 408 wrote to memory of 3996 408 rundll32.exe e580913.exe PID 408 wrote to memory of 3996 408 rundll32.exe e580913.exe PID 3996 wrote to memory of 784 3996 e580913.exe fontdrvhost.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e57dfa2.exee580913.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfa2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e580913.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:64
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2664
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2780
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a9ccebb790c8db6f93d51b5a06adf1d0_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a9ccebb790c8db6f93d51b5a06adf1d0_NeikiAnalytics.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\e57dfa2.exeC:\Users\Admin\AppData\Local\Temp\e57dfa2.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\e57e09c.exeC:\Users\Admin\AppData\Local\Temp\e57e09c.exe4⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\e580913.exeC:\Users\Admin\AppData\Local\Temp\e580913.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3600
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3800
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3892
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3956
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4044
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3492
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4428
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2256
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:4672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffd9946ceb8,0x7ffd9946cec4,0x7ffd9946ced02⤵PID:3948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2296,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:1924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:32⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2400,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=3420 /prefetch:82⤵PID:2092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3456,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:1656
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2020
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3084
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3760
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5d7b58f9331848207b939b82e3aec3b5e
SHA147aab41503467c3c1b16706be495eacf682ffdbb
SHA25626c464c84f9d2e013bfe52717b395cf5adaa248f7e38d7c0291bb8e609d46728
SHA51275199abf2412cc43fbbbc3f7d848c70b776681741ce642cd3319555990a33fc1972326e5d5c79e2ab6838d615ded2743c55cd33e4b0f70d137355fe6a165085c
-
Filesize
257B
MD5da3d7b7c65a3b103bb7f4611f43e0ac5
SHA13335528cbe3bd42b2769e399831b27344144dc74
SHA256ca8a3384213224dd45cdc5f281d6de1aa22f741869949ef552a5096a4b02a8a1
SHA5125db266dbe739320ae0e742e4f33f7ebe7691038278fd2a518e69362e11d03db96a19fa58cdeaf419ae441f41ae483aa5a0c0e941eb505e9018048adc107d620b