Overview
overview
10Static
static
31408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...VR.exe
windows7-x64
31408_cn_V8...VR.exe
windows10-2004-x64
101408_cn_V8...lt.htm
windows7-x64
71408_cn_V8...lt.htm
windows10-2004-x64
11408_cn_V8...de.exe
windows7-x64
31408_cn_V8...de.exe
windows10-2004-x64
31408_cn_V8...ew.dll
windows7-x64
11408_cn_V8...ew.dll
windows10-2004-x64
11408_cn_V8...ew.exe
windows7-x64
31408_cn_V8...ew.exe
windows10-2004-x64
101408_cn_V8...rs.exe
windows7-x64
31408_cn_V8...rs.exe
windows10-2004-x64
101408_cn_V8...up.exe
windows7-x64
31408_cn_V8...up.exe
windows10-2004-x64
101408_cn_V8...20.sys
windows7-x64
11408_cn_V8...20.sys
windows10-2004-x64
11408_cn_V8...oo.exe
windows7-x64
31408_cn_V8...oo.exe
windows10-2004-x64
101408_cn_V8...lp.chm
windows7-x64
11408_cn_V8...lp.chm
windows10-2004-x64
11408_cn_V8...er.exe
windows7-x64
11408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...��.doc
windows7-x64
41408_cn_V8...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win10v2004-20240508-en
General
-
Target
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
-
Size
2.5MB
-
MD5
f9166494f1985a3eddba32daa0b5bcc2
-
SHA1
5cc399423c3045ba0dae8d86d36eaf4f2c46813f
-
SHA256
6126705a56b664f9f652e40eae03bc1c279e6dd9a31f47786099e70b84b55c87
-
SHA512
36a9474af423f34a990ba108258a5e01bbeea04bedf78f837988df620a3cedb6619c53ffe330f541001e835b4fffe451a6814540ec64c37c47a44238842dbc63
-
SSDEEP
24576:Yv0rfSlemjqiKz25Z4MP79SSeq0wnlY/p0o8QQQQQQQQQQVxpVVVVVVVVVVVVVVg:Ylko4MP79jeq0wnlY+oYxc/
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Processes:
Net Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Net Player.exe -
Processes:
Net Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Net Player.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
Net Player.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" Net Player.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3840 netsh.exe -
Processes:
resource yara_rule behavioral2/memory/2796-1-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-12-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-4-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-29-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-28-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-42-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-41-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-43-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-46-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-51-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-77-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-81-0x0000000002840000-0x0000000003873000-memory.dmp upx behavioral2/memory/2796-84-0x0000000002840000-0x0000000003873000-memory.dmp upx -
Processes:
Net Player.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Net Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Net Player.exe -
Processes:
Net Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Net Player.exe -
Drops file in Program Files directory 12 IoCs
Processes:
Net Player.exedescription ioc process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe Net Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe Net Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe Net Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe Net Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe Net Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe Net Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe Net Player.exe File opened for modification C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE Net Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe Net Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe Net Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe Net Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe Net Player.exe -
Drops file in Windows directory 2 IoCs
Processes:
Net Player.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI Net Player.exe File opened for modification C:\Windows\wpdvrnet.ini Net Player.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
Net Player.exepid process 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe 2796 Net Player.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Net Player.exedescription pid process Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe Token: SeDebugPrivilege 2796 Net Player.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Net Player.exedescription pid process target process PID 2796 wrote to memory of 776 2796 Net Player.exe fontdrvhost.exe PID 2796 wrote to memory of 780 2796 Net Player.exe fontdrvhost.exe PID 2796 wrote to memory of 1020 2796 Net Player.exe dwm.exe PID 2796 wrote to memory of 3032 2796 Net Player.exe sihost.exe PID 2796 wrote to memory of 3056 2796 Net Player.exe svchost.exe PID 2796 wrote to memory of 3188 2796 Net Player.exe taskhostw.exe PID 2796 wrote to memory of 3484 2796 Net Player.exe Explorer.EXE PID 2796 wrote to memory of 3652 2796 Net Player.exe svchost.exe PID 2796 wrote to memory of 3852 2796 Net Player.exe DllHost.exe PID 2796 wrote to memory of 3980 2796 Net Player.exe StartMenuExperienceHost.exe PID 2796 wrote to memory of 4044 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 668 2796 Net Player.exe SearchApp.exe PID 2796 wrote to memory of 3144 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 4592 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 3604 2796 Net Player.exe TextInputHost.exe PID 2796 wrote to memory of 1040 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 4148 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 3636 2796 Net Player.exe backgroundTaskHost.exe PID 2796 wrote to memory of 1908 2796 Net Player.exe backgroundTaskHost.exe PID 2796 wrote to memory of 3840 2796 Net Player.exe netsh.exe PID 2796 wrote to memory of 3840 2796 Net Player.exe netsh.exe PID 2796 wrote to memory of 3840 2796 Net Player.exe netsh.exe PID 2796 wrote to memory of 776 2796 Net Player.exe fontdrvhost.exe PID 2796 wrote to memory of 780 2796 Net Player.exe fontdrvhost.exe PID 2796 wrote to memory of 1020 2796 Net Player.exe dwm.exe PID 2796 wrote to memory of 3032 2796 Net Player.exe sihost.exe PID 2796 wrote to memory of 3056 2796 Net Player.exe svchost.exe PID 2796 wrote to memory of 3188 2796 Net Player.exe taskhostw.exe PID 2796 wrote to memory of 3484 2796 Net Player.exe Explorer.EXE PID 2796 wrote to memory of 3652 2796 Net Player.exe svchost.exe PID 2796 wrote to memory of 3852 2796 Net Player.exe DllHost.exe PID 2796 wrote to memory of 3980 2796 Net Player.exe StartMenuExperienceHost.exe PID 2796 wrote to memory of 4044 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 668 2796 Net Player.exe SearchApp.exe PID 2796 wrote to memory of 3144 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 4592 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 3604 2796 Net Player.exe TextInputHost.exe PID 2796 wrote to memory of 1040 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 4148 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 3636 2796 Net Player.exe backgroundTaskHost.exe PID 2796 wrote to memory of 776 2796 Net Player.exe fontdrvhost.exe PID 2796 wrote to memory of 780 2796 Net Player.exe fontdrvhost.exe PID 2796 wrote to memory of 1020 2796 Net Player.exe dwm.exe PID 2796 wrote to memory of 3032 2796 Net Player.exe sihost.exe PID 2796 wrote to memory of 3056 2796 Net Player.exe svchost.exe PID 2796 wrote to memory of 3188 2796 Net Player.exe taskhostw.exe PID 2796 wrote to memory of 3484 2796 Net Player.exe Explorer.EXE PID 2796 wrote to memory of 3652 2796 Net Player.exe svchost.exe PID 2796 wrote to memory of 3852 2796 Net Player.exe DllHost.exe PID 2796 wrote to memory of 3980 2796 Net Player.exe StartMenuExperienceHost.exe PID 2796 wrote to memory of 4044 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 668 2796 Net Player.exe SearchApp.exe PID 2796 wrote to memory of 3144 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 4592 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 3604 2796 Net Player.exe TextInputHost.exe PID 2796 wrote to memory of 1040 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 4148 2796 Net Player.exe RuntimeBroker.exe PID 2796 wrote to memory of 3636 2796 Net Player.exe backgroundTaskHost.exe PID 2796 wrote to memory of 3316 2796 Net Player.exe NOTEPAD.EXE PID 2796 wrote to memory of 3316 2796 Net Player.exe NOTEPAD.EXE PID 2796 wrote to memory of 3316 2796 Net Player.exe NOTEPAD.EXE PID 2796 wrote to memory of 3316 2796 Net Player.exe NOTEPAD.EXE PID 2796 wrote to memory of 4524 2796 Net Player.exe NOTEPAD.EXE PID 2796 wrote to memory of 4524 2796 Net Player.exe NOTEPAD.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
Net Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Net Player.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1020
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3056
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\DVP\Net Player.exe"C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\DVP\Net Player.exe"2⤵
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2796 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
PID:3840 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3316
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4524
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:2856
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3852
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3980
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4044
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:668
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3144
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4592
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3604
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1040
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4148
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3636
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1908
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x3081⤵PID:3360
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD508ce636f020798244ea7faef67b28dad
SHA1a6c0ea3ddc739e99c2912220b58398797f4ff224
SHA256fa532a8c43bce44b3f19c9b5d817f0fecc3a78551f7458f66605bd3d5a57e73c
SHA512033a1721709de07ece2152374639e1ebd722d28a89d765580c225240e30e6a26374e0f80736bcb561e54d2606cef0f60b3ac336e4264c2ff743340256f1ca16a