Overview
overview
10Static
static
31408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...VR.exe
windows7-x64
31408_cn_V8...VR.exe
windows10-2004-x64
101408_cn_V8...lt.htm
windows7-x64
71408_cn_V8...lt.htm
windows10-2004-x64
11408_cn_V8...de.exe
windows7-x64
31408_cn_V8...de.exe
windows10-2004-x64
31408_cn_V8...ew.dll
windows7-x64
11408_cn_V8...ew.dll
windows10-2004-x64
11408_cn_V8...ew.exe
windows7-x64
31408_cn_V8...ew.exe
windows10-2004-x64
101408_cn_V8...rs.exe
windows7-x64
31408_cn_V8...rs.exe
windows10-2004-x64
101408_cn_V8...up.exe
windows7-x64
31408_cn_V8...up.exe
windows10-2004-x64
101408_cn_V8...20.sys
windows7-x64
11408_cn_V8...20.sys
windows10-2004-x64
11408_cn_V8...oo.exe
windows7-x64
31408_cn_V8...oo.exe
windows10-2004-x64
101408_cn_V8...lp.chm
windows7-x64
11408_cn_V8...lp.chm
windows10-2004-x64
11408_cn_V8...er.exe
windows7-x64
11408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...��.doc
windows7-x64
41408_cn_V8...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win10v2004-20240508-en
General
-
Target
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
-
Size
369KB
-
MD5
1be52c06dd3a011195f4d94b596db7cc
-
SHA1
5b1ef3df5d3d7476d8f641cce92a32eb5f6eceae
-
SHA256
c5550f8bb9b7779ab499448000ea54022cf8866fb7924abfc97d9f91bc9db010
-
SHA512
60fe7a59872f0b6420e2b5201b037221492cbfdefbcc64c6c9f403184e60c86ec792be9136609f8ee420b020800f3236d1f7a76f02e878f9bc2849b574a6c332
-
SSDEEP
6144:BZuuObR8sVImcyYC5Jk2PM1fHLEm20M3vX6B/6FZ+gsRJyl4z1RDXDEL:uV+mzIdQm20MfG/AAml4/DIL
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Processes:
webview.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" webview.exe -
Processes:
webview.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" webview.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
webview.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" webview.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4568 netsh.exe -
Processes:
resource yara_rule behavioral14/memory/5104-12-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-10-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-3-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-23-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-24-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-36-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-43-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-47-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-49-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-75-0x00000000021E0000-0x0000000003213000-memory.dmp upx behavioral14/memory/5104-79-0x00000000021E0000-0x0000000003213000-memory.dmp upx -
Processes:
webview.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" webview.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc webview.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" webview.exe -
Processes:
webview.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" webview.exe -
Drops file in Program Files directory 13 IoCs
Processes:
webview.exedescription ioc process File opened for modification C:\PROGRAM FILES\BlockGroup.exe webview.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe webview.exe File opened for modification C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE webview.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe webview.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe webview.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe webview.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe webview.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe webview.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe webview.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe webview.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe webview.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe webview.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe webview.exe -
Drops file in Windows directory 1 IoCs
Processes:
webview.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI webview.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
webview.exepid process 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe 5104 webview.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
webview.exedescription pid process Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe Token: SeDebugPrivilege 5104 webview.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
webview.exepid process 5104 webview.exe 5104 webview.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
webview.exedescription pid process target process PID 5104 wrote to memory of 780 5104 webview.exe fontdrvhost.exe PID 5104 wrote to memory of 788 5104 webview.exe fontdrvhost.exe PID 5104 wrote to memory of 332 5104 webview.exe dwm.exe PID 5104 wrote to memory of 2568 5104 webview.exe sihost.exe PID 5104 wrote to memory of 2592 5104 webview.exe svchost.exe PID 5104 wrote to memory of 2760 5104 webview.exe taskhostw.exe PID 5104 wrote to memory of 3580 5104 webview.exe Explorer.EXE PID 5104 wrote to memory of 3688 5104 webview.exe svchost.exe PID 5104 wrote to memory of 3892 5104 webview.exe DllHost.exe PID 5104 wrote to memory of 3984 5104 webview.exe StartMenuExperienceHost.exe PID 5104 wrote to memory of 4048 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 684 5104 webview.exe SearchApp.exe PID 5104 wrote to memory of 4168 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 4468 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 2716 5104 webview.exe TextInputHost.exe PID 5104 wrote to memory of 2972 5104 webview.exe backgroundTaskHost.exe PID 5104 wrote to memory of 760 5104 webview.exe backgroundTaskHost.exe PID 5104 wrote to memory of 4568 5104 webview.exe netsh.exe PID 5104 wrote to memory of 4568 5104 webview.exe netsh.exe PID 5104 wrote to memory of 4568 5104 webview.exe netsh.exe PID 5104 wrote to memory of 780 5104 webview.exe fontdrvhost.exe PID 5104 wrote to memory of 788 5104 webview.exe fontdrvhost.exe PID 5104 wrote to memory of 332 5104 webview.exe dwm.exe PID 5104 wrote to memory of 2568 5104 webview.exe sihost.exe PID 5104 wrote to memory of 2592 5104 webview.exe svchost.exe PID 5104 wrote to memory of 2760 5104 webview.exe taskhostw.exe PID 5104 wrote to memory of 3580 5104 webview.exe Explorer.EXE PID 5104 wrote to memory of 3688 5104 webview.exe svchost.exe PID 5104 wrote to memory of 3892 5104 webview.exe DllHost.exe PID 5104 wrote to memory of 3984 5104 webview.exe StartMenuExperienceHost.exe PID 5104 wrote to memory of 4048 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 684 5104 webview.exe SearchApp.exe PID 5104 wrote to memory of 4168 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 4468 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 2716 5104 webview.exe TextInputHost.exe PID 5104 wrote to memory of 2972 5104 webview.exe backgroundTaskHost.exe PID 5104 wrote to memory of 3216 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 1496 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 780 5104 webview.exe fontdrvhost.exe PID 5104 wrote to memory of 788 5104 webview.exe fontdrvhost.exe PID 5104 wrote to memory of 332 5104 webview.exe dwm.exe PID 5104 wrote to memory of 2568 5104 webview.exe sihost.exe PID 5104 wrote to memory of 2592 5104 webview.exe svchost.exe PID 5104 wrote to memory of 2760 5104 webview.exe taskhostw.exe PID 5104 wrote to memory of 3580 5104 webview.exe Explorer.EXE PID 5104 wrote to memory of 3688 5104 webview.exe svchost.exe PID 5104 wrote to memory of 3892 5104 webview.exe DllHost.exe PID 5104 wrote to memory of 3984 5104 webview.exe StartMenuExperienceHost.exe PID 5104 wrote to memory of 4048 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 684 5104 webview.exe SearchApp.exe PID 5104 wrote to memory of 4168 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 4468 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 2716 5104 webview.exe TextInputHost.exe PID 5104 wrote to memory of 2972 5104 webview.exe backgroundTaskHost.exe PID 5104 wrote to memory of 3216 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 1496 5104 webview.exe RuntimeBroker.exe PID 5104 wrote to memory of 2652 5104 webview.exe NOTEPAD.EXE PID 5104 wrote to memory of 2652 5104 webview.exe NOTEPAD.EXE PID 5104 wrote to memory of 2652 5104 webview.exe NOTEPAD.EXE PID 5104 wrote to memory of 2652 5104 webview.exe NOTEPAD.EXE PID 5104 wrote to memory of 4432 5104 webview.exe NOTEPAD.EXE PID 5104 wrote to memory of 4432 5104 webview.exe NOTEPAD.EXE PID 5104 wrote to memory of 4432 5104 webview.exe NOTEPAD.EXE PID 5104 wrote to memory of 4432 5104 webview.exe NOTEPAD.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
webview.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" webview.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:332
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2592
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2760
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\DVR\webview.exe"C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\DVR\webview.exe"2⤵
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5104 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
PID:4568 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:2652
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4432
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4920
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3168
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3688
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3892
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3984
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4048
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:684
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4168
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4468
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2716
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2972
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:760
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3216
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1496
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5c7dc49e4c82f598eca5cd91a16b8fb32
SHA1c29a37e3aaa0e5e00e2d89d4c6bb953368852d5e
SHA256a89af778dccd5ee322bb27a9e64980b5bd590fcfe89a49ee0e8a009aff80ac87
SHA5122bd4b7c0c88d630d850862f528b7ab2fb728e0d31d24eff694c9bc2860f8c2891b75c6a653fbc99ef3e764901c0ad4fee61161377e9e794049bdc557563815b6