Overview
overview
10Static
static
31408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...VR.exe
windows7-x64
31408_cn_V8...VR.exe
windows10-2004-x64
101408_cn_V8...lt.htm
windows7-x64
71408_cn_V8...lt.htm
windows10-2004-x64
11408_cn_V8...de.exe
windows7-x64
31408_cn_V8...de.exe
windows10-2004-x64
31408_cn_V8...ew.dll
windows7-x64
11408_cn_V8...ew.dll
windows10-2004-x64
11408_cn_V8...ew.exe
windows7-x64
31408_cn_V8...ew.exe
windows10-2004-x64
101408_cn_V8...rs.exe
windows7-x64
31408_cn_V8...rs.exe
windows10-2004-x64
101408_cn_V8...up.exe
windows7-x64
31408_cn_V8...up.exe
windows10-2004-x64
101408_cn_V8...20.sys
windows7-x64
11408_cn_V8...20.sys
windows10-2004-x64
11408_cn_V8...oo.exe
windows7-x64
31408_cn_V8...oo.exe
windows10-2004-x64
101408_cn_V8...lp.chm
windows7-x64
11408_cn_V8...lp.chm
windows10-2004-x64
11408_cn_V8...er.exe
windows7-x64
11408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...��.doc
windows7-x64
41408_cn_V8...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win10v2004-20240508-en
General
-
Target
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
-
Size
6.1MB
-
MD5
ad5def7b4d6685fbd3ca1b54804ff2a0
-
SHA1
ac303840cf6eaef3670400330e81c40cd21b55e2
-
SHA256
1e113923ae4b006ef4a8102f110710cca92ff10c1940bd218a0eacbd9bc97e07
-
SHA512
c3ca2ac7d35698c39db059c957da8eb3f6a18a1c6f5c5612d0ac506600c3abcecc6c1b48d6dcb0d149758d6d7d57589056e5526759d95996e11f4942679eadeb
-
SSDEEP
49152:OmujQnm3XvHntgeMND47DnGKMMMMMMMMMRmJwD:OmujQnHKMMMMMMMMMRmU
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Processes:
Setup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup.exe -
Processes:
Setup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Setup.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
Setup.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" Setup.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3308 netsh.exe -
Processes:
resource yara_rule behavioral18/memory/3536-3-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-0-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-5-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-15-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-14-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-28-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-30-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-34-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-38-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-59-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-68-0x00000000028B0000-0x00000000038E3000-memory.dmp upx behavioral18/memory/3536-70-0x00000000028B0000-0x00000000038E3000-memory.dmp upx -
Processes:
Setup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Setup.exe -
Processes:
Setup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup.exe -
Drops file in Program Files directory 12 IoCs
Processes:
Setup.exedescription ioc process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe Setup.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe Setup.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe Setup.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe Setup.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe Setup.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe Setup.exe File opened for modification C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE Setup.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe Setup.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe Setup.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe Setup.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe Setup.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe Setup.exe -
Drops file in Windows directory 1 IoCs
Processes:
Setup.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI Setup.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
Setup.exepid process 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe 3536 Setup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Setup.exedescription pid process Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe Token: SeDebugPrivilege 3536 Setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Setup.exepid process 3536 Setup.exe 3536 Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup.exedescription pid process target process PID 3536 wrote to memory of 780 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 788 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 316 3536 Setup.exe dwm.exe PID 3536 wrote to memory of 2600 3536 Setup.exe sihost.exe PID 3536 wrote to memory of 2680 3536 Setup.exe svchost.exe PID 3536 wrote to memory of 2820 3536 Setup.exe taskhostw.exe PID 3536 wrote to memory of 3308 3536 Setup.exe netsh.exe PID 3536 wrote to memory of 3308 3536 Setup.exe netsh.exe PID 3536 wrote to memory of 3308 3536 Setup.exe netsh.exe PID 3536 wrote to memory of 3312 3536 Setup.exe Explorer.EXE PID 3536 wrote to memory of 3644 3536 Setup.exe svchost.exe PID 3536 wrote to memory of 3848 3536 Setup.exe DllHost.exe PID 3536 wrote to memory of 3940 3536 Setup.exe StartMenuExperienceHost.exe PID 3536 wrote to memory of 4004 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4084 3536 Setup.exe SearchApp.exe PID 3536 wrote to memory of 3880 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 2928 3536 Setup.exe TextInputHost.exe PID 3536 wrote to memory of 3616 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4896 3536 Setup.exe backgroundTaskHost.exe PID 3536 wrote to memory of 2732 3536 Setup.exe backgroundTaskHost.exe PID 3536 wrote to memory of 780 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 788 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 316 3536 Setup.exe dwm.exe PID 3536 wrote to memory of 2600 3536 Setup.exe sihost.exe PID 3536 wrote to memory of 2680 3536 Setup.exe svchost.exe PID 3536 wrote to memory of 2820 3536 Setup.exe taskhostw.exe PID 3536 wrote to memory of 3312 3536 Setup.exe Explorer.EXE PID 3536 wrote to memory of 3644 3536 Setup.exe svchost.exe PID 3536 wrote to memory of 3848 3536 Setup.exe DllHost.exe PID 3536 wrote to memory of 3940 3536 Setup.exe StartMenuExperienceHost.exe PID 3536 wrote to memory of 4004 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4084 3536 Setup.exe SearchApp.exe PID 3536 wrote to memory of 3880 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 2928 3536 Setup.exe TextInputHost.exe PID 3536 wrote to memory of 3616 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4896 3536 Setup.exe backgroundTaskHost.exe PID 3536 wrote to memory of 224 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4908 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 780 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 788 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 316 3536 Setup.exe dwm.exe PID 3536 wrote to memory of 2600 3536 Setup.exe sihost.exe PID 3536 wrote to memory of 2680 3536 Setup.exe svchost.exe PID 3536 wrote to memory of 2820 3536 Setup.exe taskhostw.exe PID 3536 wrote to memory of 3312 3536 Setup.exe Explorer.EXE PID 3536 wrote to memory of 3644 3536 Setup.exe svchost.exe PID 3536 wrote to memory of 3848 3536 Setup.exe DllHost.exe PID 3536 wrote to memory of 3940 3536 Setup.exe StartMenuExperienceHost.exe PID 3536 wrote to memory of 4004 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4084 3536 Setup.exe SearchApp.exe PID 3536 wrote to memory of 3880 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 2928 3536 Setup.exe TextInputHost.exe PID 3536 wrote to memory of 3616 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4896 3536 Setup.exe backgroundTaskHost.exe PID 3536 wrote to memory of 224 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 4908 3536 Setup.exe RuntimeBroker.exe PID 3536 wrote to memory of 3960 3536 Setup.exe NOTEPAD.EXE PID 3536 wrote to memory of 3960 3536 Setup.exe NOTEPAD.EXE PID 3536 wrote to memory of 3960 3536 Setup.exe NOTEPAD.EXE PID 3536 wrote to memory of 3960 3536 Setup.exe NOTEPAD.EXE PID 3536 wrote to memory of 780 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 788 3536 Setup.exe fontdrvhost.exe PID 3536 wrote to memory of 316 3536 Setup.exe dwm.exe PID 3536 wrote to memory of 2600 3536 Setup.exe sihost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2680
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2820
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\Setup.exe"2⤵
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3536 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
PID:3308 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3848
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3940
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4004
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4084
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3880
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2928
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3616
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4896
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2732
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:224
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1