Overview
overview
10Static
static
31408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...VR.exe
windows7-x64
31408_cn_V8...VR.exe
windows10-2004-x64
101408_cn_V8...lt.htm
windows7-x64
71408_cn_V8...lt.htm
windows10-2004-x64
11408_cn_V8...de.exe
windows7-x64
31408_cn_V8...de.exe
windows10-2004-x64
31408_cn_V8...ew.dll
windows7-x64
11408_cn_V8...ew.dll
windows10-2004-x64
11408_cn_V8...ew.exe
windows7-x64
31408_cn_V8...ew.exe
windows10-2004-x64
101408_cn_V8...rs.exe
windows7-x64
31408_cn_V8...rs.exe
windows10-2004-x64
101408_cn_V8...up.exe
windows7-x64
31408_cn_V8...up.exe
windows10-2004-x64
101408_cn_V8...20.sys
windows7-x64
11408_cn_V8...20.sys
windows10-2004-x64
11408_cn_V8...oo.exe
windows7-x64
31408_cn_V8...oo.exe
windows10-2004-x64
101408_cn_V8...lp.chm
windows7-x64
11408_cn_V8...lp.chm
windows10-2004-x64
11408_cn_V8...er.exe
windows7-x64
11408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...��.doc
windows7-x64
41408_cn_V8...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win10v2004-20240508-en
General
-
Target
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
-
Size
652KB
-
MD5
ac92ddcd004d45551749cada041690da
-
SHA1
7dab7a193f5b37a39fa97fa9aaef948b1bd3eced
-
SHA256
c93ba430f498527e38cd144582eea82f535c1156c94ab8c42f113347cf94363e
-
SHA512
e94af2a0e2e222f5867dca52fde601b88db2dbfc57dbc5b9a4318b2d22886da694eebbd8219ea12cdd9f05d7098b0ee74125d774fbd51addeec2069e6723475a
-
SSDEEP
12288:yQHgAZ26oWvXP254EuWxkJWWWHLgW8WmWWWWUW3W2WWVXWWWWkWnWWWWWWWWWWWR:dHtZ26Dvf25GWxkJWWWHLgW8WmWWWWUP
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Processes:
DVR Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" DVR Player.exe -
Processes:
DVR Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" DVR Player.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
DVR Player.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" DVR Player.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3540 netsh.exe -
Processes:
resource yara_rule behavioral4/memory/1280-1-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-4-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-6-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-10-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-15-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-16-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-28-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-31-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-34-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-36-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-38-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-63-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-67-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-72-0x00000000023F0000-0x0000000003423000-memory.dmp upx behavioral4/memory/1280-76-0x00000000023F0000-0x0000000003423000-memory.dmp upx -
Processes:
DVR Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" DVR Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" DVR Player.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" DVR Player.exe -
Processes:
DVR Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" DVR Player.exe -
Drops file in Program Files directory 12 IoCs
Processes:
DVR Player.exedescription ioc process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe DVR Player.exe File opened for modification C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE DVR Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe DVR Player.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe DVR Player.exe -
Drops file in Windows directory 1 IoCs
Processes:
DVR Player.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI DVR Player.exe -
Modifies registry class 10 IoCs
Processes:
DVR Player.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR\ = "WP DVR" DVR Player.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1408_cn_V8.3.0.0\\1408_cn_8.3.0.0\\DVR Player.exe,0" DVR Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR\shell\open\command DVR Player.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dvr\ = "WP.DVR" DVR Player.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1408_cn_V8.3.0.0\\1408_cn_8.3.0.0\\DVR Player.exe %1" DVR Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dvr DVR Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR DVR Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR\DefaultIcon DVR Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR\shell DVR Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WP.DVR\shell\open DVR Player.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
DVR Player.exepid process 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe 1280 DVR Player.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
DVR Player.exedescription pid process Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe Token: SeDebugPrivilege 1280 DVR Player.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
DVR Player.exedescription pid process target process PID 1280 wrote to memory of 792 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 788 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 60 1280 DVR Player.exe dwm.exe PID 1280 wrote to memory of 3028 1280 DVR Player.exe sihost.exe PID 1280 wrote to memory of 2880 1280 DVR Player.exe svchost.exe PID 1280 wrote to memory of 3164 1280 DVR Player.exe taskhostw.exe PID 1280 wrote to memory of 3432 1280 DVR Player.exe Explorer.EXE PID 1280 wrote to memory of 3556 1280 DVR Player.exe svchost.exe PID 1280 wrote to memory of 3740 1280 DVR Player.exe DllHost.exe PID 1280 wrote to memory of 3836 1280 DVR Player.exe StartMenuExperienceHost.exe PID 1280 wrote to memory of 3900 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 3988 1280 DVR Player.exe SearchApp.exe PID 1280 wrote to memory of 3368 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4364 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4344 1280 DVR Player.exe TextInputHost.exe PID 1280 wrote to memory of 908 1280 DVR Player.exe backgroundTaskHost.exe PID 1280 wrote to memory of 3736 1280 DVR Player.exe backgroundTaskHost.exe PID 1280 wrote to memory of 3540 1280 DVR Player.exe netsh.exe PID 1280 wrote to memory of 3540 1280 DVR Player.exe netsh.exe PID 1280 wrote to memory of 3540 1280 DVR Player.exe netsh.exe PID 1280 wrote to memory of 792 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 788 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 60 1280 DVR Player.exe dwm.exe PID 1280 wrote to memory of 3028 1280 DVR Player.exe sihost.exe PID 1280 wrote to memory of 2880 1280 DVR Player.exe svchost.exe PID 1280 wrote to memory of 3164 1280 DVR Player.exe taskhostw.exe PID 1280 wrote to memory of 3432 1280 DVR Player.exe Explorer.EXE PID 1280 wrote to memory of 3556 1280 DVR Player.exe svchost.exe PID 1280 wrote to memory of 3740 1280 DVR Player.exe DllHost.exe PID 1280 wrote to memory of 3836 1280 DVR Player.exe StartMenuExperienceHost.exe PID 1280 wrote to memory of 3900 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 3988 1280 DVR Player.exe SearchApp.exe PID 1280 wrote to memory of 3368 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4364 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4344 1280 DVR Player.exe TextInputHost.exe PID 1280 wrote to memory of 908 1280 DVR Player.exe backgroundTaskHost.exe PID 1280 wrote to memory of 2552 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4996 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 792 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 788 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 60 1280 DVR Player.exe dwm.exe PID 1280 wrote to memory of 3028 1280 DVR Player.exe sihost.exe PID 1280 wrote to memory of 2880 1280 DVR Player.exe svchost.exe PID 1280 wrote to memory of 3164 1280 DVR Player.exe taskhostw.exe PID 1280 wrote to memory of 3432 1280 DVR Player.exe Explorer.EXE PID 1280 wrote to memory of 3556 1280 DVR Player.exe svchost.exe PID 1280 wrote to memory of 3740 1280 DVR Player.exe DllHost.exe PID 1280 wrote to memory of 3836 1280 DVR Player.exe StartMenuExperienceHost.exe PID 1280 wrote to memory of 3900 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 3988 1280 DVR Player.exe SearchApp.exe PID 1280 wrote to memory of 3368 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4364 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4344 1280 DVR Player.exe TextInputHost.exe PID 1280 wrote to memory of 908 1280 DVR Player.exe backgroundTaskHost.exe PID 1280 wrote to memory of 2552 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 4996 1280 DVR Player.exe RuntimeBroker.exe PID 1280 wrote to memory of 1204 1280 DVR Player.exe NOTEPAD.EXE PID 1280 wrote to memory of 1204 1280 DVR Player.exe NOTEPAD.EXE PID 1280 wrote to memory of 1204 1280 DVR Player.exe NOTEPAD.EXE PID 1280 wrote to memory of 1204 1280 DVR Player.exe NOTEPAD.EXE PID 1280 wrote to memory of 792 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 788 1280 DVR Player.exe fontdrvhost.exe PID 1280 wrote to memory of 60 1280 DVR Player.exe dwm.exe PID 1280 wrote to memory of 3028 1280 DVR Player.exe sihost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
DVR Player.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" DVR Player.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:60
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2880
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\DVR Player.exe"C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\DVR Player.exe"2⤵
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1280 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
PID:3540 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3556
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3740
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3836
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3900
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3988
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3368
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4364
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4344
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:908
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3736
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x4f81⤵PID:4224
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2552
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4996
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1