Analysis
-
max time kernel
135s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
ab10bc1281557ef97eea4042a51c6a40_NeikiAnalytics.dll
Resource
win7-20240508-en
General
-
Target
ab10bc1281557ef97eea4042a51c6a40_NeikiAnalytics.dll
-
Size
120KB
-
MD5
ab10bc1281557ef97eea4042a51c6a40
-
SHA1
f92d2be3ef76ed2bd8207ad0c3c48e7555902010
-
SHA256
c58c31f7ccffa968ac8f59437ede22537fbdbf34ac5aaa5c2b2d19929b105eeb
-
SHA512
8a21fc8b20acbca1e09b9e2bccd39140062e0e1727c4ced42d74e4f703de0a146c22ee885bcecddce763b7ad0fc765bda2282f50c99816f717bca5886f8a8bab
-
SSDEEP
1536:/oRTlHSmmvpP4b13eH1rve9+kzJtU+2Z0mI8U0hmYzMjS9jfxbHOyy78/vg:AR5SmmvpI61q9+U23I8UHYQGfe78
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e573642.exee575237.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e573642.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e573642.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e575237.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e575237.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e575237.exe -
Processes:
e573642.exee575237.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575237.exe -
Processes:
e573642.exee575237.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575237.exe -
Executes dropped EXE 4 IoCs
Processes:
e573642.exee5736fe.exee575237.exee575256.exepid process 712 e573642.exe 400 e5736fe.exe 1828 e575237.exe 1636 e575256.exe -
Processes:
resource yara_rule behavioral2/memory/712-13-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-26-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-35-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-34-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-30-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-12-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-11-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-10-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-9-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-8-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-6-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-36-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-37-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-38-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-40-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-39-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-42-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-43-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-57-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-59-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-60-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-74-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-76-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-79-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-81-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-82-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-83-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-86-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-87-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-89-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-92-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-91-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/712-97-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1828-143-0x0000000000B80000-0x0000000001C3A000-memory.dmp upx -
Processes:
e575237.exee573642.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575237.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e573642.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575237.exe -
Processes:
e573642.exee575237.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575237.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e573642.exedescription ioc process File opened (read-only) \??\I: e573642.exe File opened (read-only) \??\N: e573642.exe File opened (read-only) \??\P: e573642.exe File opened (read-only) \??\G: e573642.exe File opened (read-only) \??\O: e573642.exe File opened (read-only) \??\Q: e573642.exe File opened (read-only) \??\R: e573642.exe File opened (read-only) \??\S: e573642.exe File opened (read-only) \??\E: e573642.exe File opened (read-only) \??\H: e573642.exe File opened (read-only) \??\J: e573642.exe File opened (read-only) \??\M: e573642.exe File opened (read-only) \??\K: e573642.exe File opened (read-only) \??\L: e573642.exe File opened (read-only) \??\T: e573642.exe -
Drops file in Program Files directory 4 IoCs
Processes:
e573642.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zFM.exe e573642.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e573642.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e573642.exe File opened for modification C:\Program Files\7-Zip\7z.exe e573642.exe -
Drops file in Windows directory 3 IoCs
Processes:
e573642.exee575237.exedescription ioc process File created C:\Windows\e573671 e573642.exe File opened for modification C:\Windows\SYSTEM.INI e573642.exe File created C:\Windows\e57a0a5 e575237.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e573642.exepid process 712 e573642.exe 712 e573642.exe 712 e573642.exe 712 e573642.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e573642.exedescription pid process Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe Token: SeDebugPrivilege 712 e573642.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
rundll32.exerundll32.exee573642.exedescription pid process target process PID 3648 wrote to memory of 3048 3648 rundll32.exe rundll32.exe PID 3648 wrote to memory of 3048 3648 rundll32.exe rundll32.exe PID 3648 wrote to memory of 3048 3648 rundll32.exe rundll32.exe PID 3048 wrote to memory of 712 3048 rundll32.exe e573642.exe PID 3048 wrote to memory of 712 3048 rundll32.exe e573642.exe PID 3048 wrote to memory of 712 3048 rundll32.exe e573642.exe PID 712 wrote to memory of 772 712 e573642.exe fontdrvhost.exe PID 712 wrote to memory of 780 712 e573642.exe fontdrvhost.exe PID 712 wrote to memory of 68 712 e573642.exe dwm.exe PID 712 wrote to memory of 2772 712 e573642.exe sihost.exe PID 712 wrote to memory of 2844 712 e573642.exe svchost.exe PID 712 wrote to memory of 3016 712 e573642.exe taskhostw.exe PID 712 wrote to memory of 3408 712 e573642.exe Explorer.EXE PID 712 wrote to memory of 3520 712 e573642.exe svchost.exe PID 712 wrote to memory of 3704 712 e573642.exe DllHost.exe PID 712 wrote to memory of 3788 712 e573642.exe StartMenuExperienceHost.exe PID 712 wrote to memory of 3864 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 3948 712 e573642.exe SearchApp.exe PID 712 wrote to memory of 3828 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 4112 712 e573642.exe TextInputHost.exe PID 712 wrote to memory of 3088 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 2240 712 e573642.exe backgroundTaskHost.exe PID 712 wrote to memory of 2600 712 e573642.exe backgroundTaskHost.exe PID 712 wrote to memory of 3648 712 e573642.exe rundll32.exe PID 712 wrote to memory of 3048 712 e573642.exe rundll32.exe PID 712 wrote to memory of 3048 712 e573642.exe rundll32.exe PID 712 wrote to memory of 3452 712 e573642.exe BackgroundTransferHost.exe PID 3048 wrote to memory of 400 3048 rundll32.exe e5736fe.exe PID 3048 wrote to memory of 400 3048 rundll32.exe e5736fe.exe PID 3048 wrote to memory of 400 3048 rundll32.exe e5736fe.exe PID 3048 wrote to memory of 1828 3048 rundll32.exe e575237.exe PID 3048 wrote to memory of 1828 3048 rundll32.exe e575237.exe PID 3048 wrote to memory of 1828 3048 rundll32.exe e575237.exe PID 3048 wrote to memory of 1636 3048 rundll32.exe e575256.exe PID 3048 wrote to memory of 1636 3048 rundll32.exe e575256.exe PID 3048 wrote to memory of 1636 3048 rundll32.exe e575256.exe PID 712 wrote to memory of 772 712 e573642.exe fontdrvhost.exe PID 712 wrote to memory of 780 712 e573642.exe fontdrvhost.exe PID 712 wrote to memory of 68 712 e573642.exe dwm.exe PID 712 wrote to memory of 2772 712 e573642.exe sihost.exe PID 712 wrote to memory of 2844 712 e573642.exe svchost.exe PID 712 wrote to memory of 3016 712 e573642.exe taskhostw.exe PID 712 wrote to memory of 3408 712 e573642.exe Explorer.EXE PID 712 wrote to memory of 3520 712 e573642.exe svchost.exe PID 712 wrote to memory of 3704 712 e573642.exe DllHost.exe PID 712 wrote to memory of 3788 712 e573642.exe StartMenuExperienceHost.exe PID 712 wrote to memory of 3864 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 3948 712 e573642.exe SearchApp.exe PID 712 wrote to memory of 3828 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 4112 712 e573642.exe TextInputHost.exe PID 712 wrote to memory of 3088 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 2240 712 e573642.exe backgroundTaskHost.exe PID 712 wrote to memory of 400 712 e573642.exe e5736fe.exe PID 712 wrote to memory of 400 712 e573642.exe e5736fe.exe PID 712 wrote to memory of 2780 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 5028 712 e573642.exe RuntimeBroker.exe PID 712 wrote to memory of 1828 712 e573642.exe e575237.exe PID 712 wrote to memory of 1828 712 e573642.exe e575237.exe PID 712 wrote to memory of 1636 712 e573642.exe e575256.exe PID 712 wrote to memory of 1636 712 e573642.exe e575256.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e573642.exee575237.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e573642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575237.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:68
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2844
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3016
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab10bc1281557ef97eea4042a51c6a40_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab10bc1281557ef97eea4042a51c6a40_NeikiAnalytics.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\e573642.exeC:\Users\Admin\AppData\Local\Temp\e573642.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:712 -
C:\Users\Admin\AppData\Local\Temp\e5736fe.exeC:\Users\Admin\AppData\Local\Temp\e5736fe.exe4⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\e575237.exeC:\Users\Admin\AppData\Local\Temp\e575237.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\e575256.exeC:\Users\Admin\AppData\Local\Temp\e575256.exe4⤵
- Executes dropped EXE
PID:1636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3520
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3704
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3864
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3948
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3828
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4112
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3088
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2240
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2600
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:3452
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2780
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD526aec2a73f05392ce44457ee1d4bad26
SHA1293bd1ae86d62bea6fbe75928ff19a2bab9b3dc6
SHA2565e63203f3c67e933cb24f913cbee2e5c06ce3c03d11a797c9959521855092caf
SHA51236866170ca83d3b8aba317778c5501f7451d31985add578236befa3ee2baec7119ddee3807754ace0499ddb1717ec55dbec8a0ff62229bdb16e367c525862cc7
-
Filesize
257B
MD5c2b3759cf5aaafcd36cb665a23b0d81c
SHA1669b330539540e3893bad18c6543e71a9b48f24c
SHA256e0c553bf073c6e56fe3cb039eedc00c1ba03e7a97237dcc9d87d626ae7ded88a
SHA512ec2de57b693ec3aaf5e014b5eea3a308d49d20c27048090e0a809a3e225a214f054835d643181321537afce0a439123d6867f811be938419b22f24b428a4407d