Analysis
-
max time kernel
23s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe
Resource
win7-20231129-en
General
-
Target
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe
-
Size
1.7MB
-
MD5
76306394646f5a2bc1b61ded001f1b26
-
SHA1
781c36faafca1c6279cd60704a472d1503336408
-
SHA256
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff
-
SHA512
6a234c69d1a6d18f2999350fb213dc29b7eca7987d76b99e78cc2c344159bcc52e28954c8ae44b7873af7b627292e9c33c9896c23d107847991064489e6c2dc6
-
SSDEEP
24576:k5xolYQY6qObJ97J2xc20J7pBD0aej1zj1SqdAGFQZIxpK545UJoeKYd:nY4RGk7pBwVRzjYq+ZI2a5UJoeH
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Processes:
explorer.exe89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" explorer.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-7-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-9-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-5-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-10-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-8-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-6-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-12-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-11-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-13-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-91-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-102-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-95-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3060-126-0x00000000025D0000-0x000000000365E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2800-207-0x0000000003450000-0x00000000044DE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2800-204-0x0000000003450000-0x00000000044DE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2800-206-0x0000000003450000-0x00000000044DE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2800-205-0x0000000003450000-0x00000000044DE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2800-211-0x0000000003450000-0x00000000044DE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2800-202-0x0000000003450000-0x00000000044DE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine C:\asjdb.pif INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 24 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-7-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-9-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-5-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-10-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-8-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-6-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-12-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-11-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-13-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-91-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/2040-106-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/2780-117-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/3060-102-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/3060-95-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/2668-125-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/3060-139-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/3060-126-0x00000000025D0000-0x000000000365E000-memory.dmp UPX behavioral1/memory/2008-120-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/2800-207-0x0000000003450000-0x00000000044DE000-memory.dmp UPX behavioral1/memory/2800-204-0x0000000003450000-0x00000000044DE000-memory.dmp UPX behavioral1/memory/2800-206-0x0000000003450000-0x00000000044DE000-memory.dmp UPX behavioral1/memory/2800-205-0x0000000003450000-0x00000000044DE000-memory.dmp UPX behavioral1/memory/2800-211-0x0000000003450000-0x00000000044DE000-memory.dmp UPX behavioral1/memory/2800-202-0x0000000003450000-0x00000000044DE000-memory.dmp UPX -
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 5 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
360TS_Setup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\Geo\Nation 360TS_Setup.exe -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 2800 explorer.exe -
Executes dropped EXE 8 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exe360TS_Setup.exe360TS_Setup.exepid process 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2668 icsys.icn.exe 2800 explorer.exe 2008 spoolsv.exe 2040 svchost.exe 2780 spoolsv.exe 2664 360TS_Setup.exe 2600 360TS_Setup.exe -
Loads dropped DLL 19 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exe360TS_Setup.exe360TS_Setup.exepid process 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2668 icsys.icn.exe 2668 icsys.icn.exe 2800 explorer.exe 2800 explorer.exe 2008 spoolsv.exe 2008 spoolsv.exe 2040 svchost.exe 2040 svchost.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2664 360TS_Setup.exe 2664 360TS_Setup.exe 2600 360TS_Setup.exe -
Processes:
resource yara_rule behavioral1/memory/3060-7-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-9-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-5-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-10-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-8-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-6-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-12-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-11-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-13-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-91-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-102-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-95-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/3060-126-0x00000000025D0000-0x000000000365E000-memory.dmp upx behavioral1/memory/2800-207-0x0000000003450000-0x00000000044DE000-memory.dmp upx behavioral1/memory/2800-204-0x0000000003450000-0x00000000044DE000-memory.dmp upx behavioral1/memory/2800-206-0x0000000003450000-0x00000000044DE000-memory.dmp upx behavioral1/memory/2800-205-0x0000000003450000-0x00000000044DE000-memory.dmp upx behavioral1/memory/2800-211-0x0000000003450000-0x00000000044DE000-memory.dmp upx behavioral1/memory/2800-202-0x0000000003450000-0x00000000044DE000-memory.dmp upx -
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Enumerates connected drives 3 TTPs 7 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\K: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\J: explorer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exedescription ioc process File opened for modification \??\PhysicalDrive0 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe File opened for modification \??\PhysicalDrive0 360TS_Setup.exe -
Drops file in Program Files directory 2 IoCs
Processes:
360TS_Setup.exedescription ioc process File created C:\Program Files (x86)\1716345634_0\360TS_Setup.exe 360TS_Setup.exe File opened for modification C:\Program Files (x86)\1716345634_0\360TS_Setup.exe 360TS_Setup.exe -
Drops file in Windows directory 6 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeicsys.icn.exeexplorer.exesvchost.exepid process 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2668 icsys.icn.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2800 explorer.exe 2040 svchost.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe 2800 explorer.exe 2040 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2800 explorer.exe 2040 svchost.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe explorer.exedescription pid process Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeManageVolumePrivilege 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe Token: SeDebugPrivilege 2800 explorer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exepid process 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exepid process 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 2668 icsys.icn.exe 2668 icsys.icn.exe 2800 explorer.exe 2800 explorer.exe 2008 spoolsv.exe 2008 spoolsv.exe 2040 svchost.exe 2040 svchost.exe 2780 spoolsv.exe 2780 spoolsv.exe 2800 explorer.exe 2800 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exe89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exedescription pid process target process PID 3060 wrote to memory of 1268 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe taskhost.exe PID 3060 wrote to memory of 1348 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Dwm.exe PID 3060 wrote to memory of 1380 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Explorer.EXE PID 3060 wrote to memory of 1460 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe DllHost.exe PID 3060 wrote to memory of 2580 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 3060 wrote to memory of 2580 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 3060 wrote to memory of 2580 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 3060 wrote to memory of 2580 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 3060 wrote to memory of 2580 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 3060 wrote to memory of 2580 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 3060 wrote to memory of 2580 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 3060 wrote to memory of 2668 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe icsys.icn.exe PID 3060 wrote to memory of 2668 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe icsys.icn.exe PID 3060 wrote to memory of 2668 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe icsys.icn.exe PID 3060 wrote to memory of 2668 3060 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe icsys.icn.exe PID 2668 wrote to memory of 2800 2668 icsys.icn.exe explorer.exe PID 2668 wrote to memory of 2800 2668 icsys.icn.exe explorer.exe PID 2668 wrote to memory of 2800 2668 icsys.icn.exe explorer.exe PID 2668 wrote to memory of 2800 2668 icsys.icn.exe explorer.exe PID 2800 wrote to memory of 2008 2800 explorer.exe spoolsv.exe PID 2800 wrote to memory of 2008 2800 explorer.exe spoolsv.exe PID 2800 wrote to memory of 2008 2800 explorer.exe spoolsv.exe PID 2800 wrote to memory of 2008 2800 explorer.exe spoolsv.exe PID 2008 wrote to memory of 2040 2008 spoolsv.exe svchost.exe PID 2008 wrote to memory of 2040 2008 spoolsv.exe svchost.exe PID 2008 wrote to memory of 2040 2008 spoolsv.exe svchost.exe PID 2008 wrote to memory of 2040 2008 spoolsv.exe svchost.exe PID 2040 wrote to memory of 2780 2040 svchost.exe spoolsv.exe PID 2040 wrote to memory of 2780 2040 svchost.exe spoolsv.exe PID 2040 wrote to memory of 2780 2040 svchost.exe spoolsv.exe PID 2040 wrote to memory of 2780 2040 svchost.exe spoolsv.exe PID 2040 wrote to memory of 560 2040 svchost.exe at.exe PID 2040 wrote to memory of 560 2040 svchost.exe at.exe PID 2040 wrote to memory of 560 2040 svchost.exe at.exe PID 2040 wrote to memory of 560 2040 svchost.exe at.exe PID 2800 wrote to memory of 1268 2800 explorer.exe taskhost.exe PID 2800 wrote to memory of 1348 2800 explorer.exe Dwm.exe PID 2800 wrote to memory of 1380 2800 explorer.exe Explorer.EXE PID 2800 wrote to memory of 1460 2800 explorer.exe DllHost.exe PID 2800 wrote to memory of 2580 2800 explorer.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 2800 wrote to memory of 2580 2800 explorer.exe 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe PID 2800 wrote to memory of 2040 2800 explorer.exe svchost.exe PID 2800 wrote to memory of 2040 2800 explorer.exe svchost.exe PID 2580 wrote to memory of 2664 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exe PID 2580 wrote to memory of 2664 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exe PID 2580 wrote to memory of 2664 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exe PID 2580 wrote to memory of 2664 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exe PID 2580 wrote to memory of 2664 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exe PID 2580 wrote to memory of 2664 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exe PID 2580 wrote to memory of 2664 2580 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 360TS_Setup.exe PID 2664 wrote to memory of 2600 2664 360TS_Setup.exe 360TS_Setup.exe PID 2664 wrote to memory of 2600 2664 360TS_Setup.exe 360TS_Setup.exe PID 2664 wrote to memory of 2600 2664 360TS_Setup.exe 360TS_Setup.exe PID 2664 wrote to memory of 2600 2664 360TS_Setup.exe 360TS_Setup.exe PID 2664 wrote to memory of 2600 2664 360TS_Setup.exe 360TS_Setup.exe PID 2664 wrote to memory of 2600 2664 360TS_Setup.exe 360TS_Setup.exe PID 2664 wrote to memory of 2600 2664 360TS_Setup.exe 360TS_Setup.exe PID 2800 wrote to memory of 1268 2800 explorer.exe taskhost.exe PID 2800 wrote to memory of 1348 2800 explorer.exe Dwm.exe PID 2800 wrote to memory of 1380 2800 explorer.exe Explorer.EXE PID 2800 wrote to memory of 1460 2800 explorer.exe DllHost.exe PID 2800 wrote to memory of 2664 2800 explorer.exe 360TS_Setup.exe PID 2800 wrote to memory of 2664 2800 explorer.exe 360TS_Setup.exe PID 2800 wrote to memory of 2600 2800 explorer.exe 360TS_Setup.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe"C:\Users\Admin\AppData\Local\Temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
\??\c:\users\admin\appdata\local\temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exec:\users\admin\appdata\local\temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\appdata\local\temp\360TS_Setup.exe"C:\Users\Admin\appdata\local\temp\360TS_Setup.exe" /c:101 /pmode:24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\1716345634_0\360TS_Setup.exe"C:\Program Files (x86)\1716345634_0\360TS_Setup.exe" /c:101 /pmode:2 /TSinstall5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Modifies Installed Components in the registry
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\at.exeat 02:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\at.exeat 02:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
10Hide Artifacts
1Hidden Files and Directories
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8Filesize
2KB
MD51644fc022c50640be4434b7afdfc6949
SHA1b66cf51b7a7cfd457b78aae87c9321a08ba7812d
SHA2561728883bbe836ae1f5f4ae3e644353d519a4b60a0bc2b21798cb1163c851ad9a
SHA5126a084caeb72ef3793551bf57420f589b83e3360ec8cf6a22decc857f0d42193d2359b0957a516de0a5ce6c28490e1d72d74e9bede5e06389e310f39df1fbf80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD5d8e0e108bd3225ee4823e2501a9c59b8
SHA190ee76ccb7a8c1cee70959c25f1cfffcb399aaeb
SHA256482fed17ea597c86abe64224786bd51836c64071c1047ca970c09ae96185c1cf
SHA512d7bd3501cf8a9a5d1f8cc34c5bd88af6228f40c97bb48f58cdfdded4775769d215c8029fb9fad8cfb27628e2550092c1bd82574f1218540c4288da141d581d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8Filesize
488B
MD5d06ca1de376d9b5760f452af5b3aaae2
SHA10436b5fcb46b0235041993b2fceb881439480326
SHA256f3b05f30edf05a9292e2c6b7513cf57744c38504df04e62928f89ceb7a2450f7
SHA5122827c443e0e7c548ebc867b8b54d556b075d6ddc0946acb7ece9c81cb37d4d6558dc84579fcf66b7f36044f07aca5cce7667854bc9506820d064c3e72dca3f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ec961a426b2be7a5e6cbdca16fbde362
SHA1115f843235834f27fa7d4762607bc9f04e9afb85
SHA2566edeec87b86cd9296a88991a23c1d45f25349c574c3d1e0a3e3d04bb9d57a459
SHA512514a2e30db640705eae6bfac5a10fe0b1603e31c26712f9c0beee024548b0e035e2558c2863ef064fc3febe70be725f3044c15d6600a5c879c8f871c016b255e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD5e713c60d6e1a04bcf4c4b9e16fe9045a
SHA144a30a99727a552b2293dd27ac66479f25c97ed7
SHA2567b2028e9c6f02a452323f6c73dc6fdeb103e11cea35703c2df6ea50929403477
SHA512cc2b94248f1fb221dd15f770dba967dda22416935848845ef5d9d09ce432251e2febf6047380f4f04e14cffa9b16fd6fef679c33e37e0203ae9c1fa6a6312bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5f4d1030e59ab3e8213e149de4a4f330f
SHA184e4e0cb3d14879a54d1340143bda70ec31c2d85
SHA2563bfc9ed76807c11cb6bec91f5b1ee39fb0fd0c33134352d1c89ab29f96688173
SHA512860f78c2dd8f3a384699b5bba0c2d5ac6d46f3abb5559ad6a5104356b1381fe4ff33509ac6736d852c2d6aae12ce1912cd37b558c7bf0c62f07a360c5be93e24
-
C:\Users\Admin\AppData\Local\Temp\[email protected]Filesize
656B
MD5184a117024f3789681894c67b36ce990
SHA1c5b687db3b27ef04ad2b2cbc9f4e523cb7f6ba7e
SHA256b10d5fef165fc89e61cd16e02eac1b90b8f94ef95218bdd4b678cd0d5c8a925e
SHA512354d3bbc1329cbbe30d22f0cf95564e44acc68d6fe91e2beb4584a473d320faf4c092de9db7f1f93cf0b235703fc8de913883985c7d5db6b596244771a1edaf7
-
C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.iniFilesize
830B
MD5e6edb41c03bce3f822020878bde4e246
SHA103198ad7bbfbdd50dd66ab4bed13ad230b66e4d9
SHA2569fa80f0889358d9db3d249a2e747e27b7c01c6123b784d94d169c0e54cacf454
SHA5122d71b7d50212f980e82562af95598c430aa0875f7a9d9cc670ba2cb1f63057fb26fd747a99cb4ca08f2355d002daa79bda2236b3ad9e37a3cfef32ae5420e2a1
-
C:\Users\Admin\AppData\Local\Temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exeFilesize
1.4MB
MD5fa39b3b422dc4232ef24e3f27fa8d69e
SHA1db04fa528bceb7284606997c660c74b8776892f7
SHA2564966ffd1379486d8d16508579522df2d19a715aac1ba168cb14dd8310b8adaf6
SHA512b60b661142653fc3007d1fc41fb25a8ab52290f7f4bc342974012fba7b53013f69f2e28dd761f9063675f48560c42eeae6523e336ed733e299f83a105a179e34
-
C:\Users\Admin\AppData\Local\Temp\Tar236E.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\{97330754-E027-4154-AE36-08737271D810}.tmpFilesize
3KB
MD52fee0e7e5c0db9a7f984a58bda3be11e
SHA14647e1517cf69154de140f722ec7ef39965d7189
SHA2564f2ad3f06aed602b6249c5d69b9558c546830116cc5f20d51eaff55937faf0ed
SHA5127e9834e9e7b16aecd17f0aac331d7396cd6ade3c8ea71d73956c19777f68d9eebc8645348b9c9d81769c2b3a45e158084e4877f4547cf876e0b90cef9c1155e5
-
C:\Users\Admin\AppData\Roaming\mrsys.exeFilesize
287KB
MD5eb28b939fb236f5ce90471764f965a45
SHA1f949800d83fdaaad0aa909c3a053dbf39cc9347a
SHA25649c25eff72ac0bc61aa54e51edf33f8bcb637b9dacaaae76d0971b77e3ecadc5
SHA512d4592576ff8461a271c97fd15e38c6a1b4a3be1381a1866572fd649f4b8af8bd170e3bda6d06a16aa20f2a8e743bdec7ad814a779de102e6ffc2434303060d05
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5734ea6c4c025860c72b3b4078d1dcc32
SHA1b0217181a3fd15dcaf066847d0dc97e3358f6018
SHA256fff1ef50da80446dcacab5811ea58c3a280982dfc0f55ebcd43da8ea14db8b73
SHA51275dd55e0d031c99111c23d8b9059c4f014145d0ff003cbd918c68fd69e1bbbca1ac8298c840bf8f68027fdf17fbb5a0b337fa0176fa1b05fb238cadfd247906e
-
C:\Windows\system\explorer.exeFilesize
287KB
MD56bd3e32334736149c6bade625a179f8e
SHA1183d56d9f589094b3c5a0e18d3f7e2dd7f82c012
SHA25635f931d5b12ee9784af48002c4e0ade8430eb1939fadad3114ca2c29f9b24101
SHA512c090d6856ca440e003652bbdb14d72d81b8d48ec3fccab2eb013bdd9ab88b8afa676fd03d76940dc105b5af559faddd24920b15aac65014307a0c4d8f2c7f098
-
C:\Windows\system\spoolsv.exeFilesize
287KB
MD5fc71c455e231a1ff92a5a272aa621d32
SHA1d1bf04dccacef72ce8f9ddfd802c75033e738740
SHA256ddbf14ca1c5ec6523c459039d3cedd6c6049b3c651ec335f79278cf78434c501
SHA512f7fd3bce006a16958214ead142ffd0248800fef89afb48ad7bc261a38de026124202bf655509d0706508df09c956b98fc5f566602db968f43757e9630223ae1b
-
C:\asjdb.pifFilesize
100KB
MD55ace2404e61e29962d7e009463e80529
SHA122959d318fcd9882a76b4885c8edc0a639130bab
SHA256c2f9973bb4e35de64b32564228449713ea3a259db21114c4727f00d9d3c660d4
SHA51295d82c9ec847d7ba90568417eb48e9a20529fadbd42cd599d581c6facd719f2e420523b35f287c54f546b79cf86c7f4823c4b60b05728efa035e89421b36bfaa
-
\Users\Admin\AppData\Local\Temp\1716345634_00000000_base\360base.dllFilesize
1.0MB
MD5b192f34d99421dc3207f2328ffe62bd0
SHA1e4bbbba20d05515678922371ea787b39f064cd2c
SHA25658f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73
SHA51200d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95
-
\Users\Admin\AppData\Local\Temp\{E56AA509-D042-4de1-B7DB-30F029F369A4}.tmp\360P2SP.dllFilesize
824KB
MD5fc1796add9491ee757e74e65cedd6ae7
SHA1603e87ab8cb45f62ecc7a9ef52d5dedd261ea812
SHA256bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60
SHA5128fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d
-
\Users\Admin\AppData\Local\icsys.icn.exeFilesize
287KB
MD50655b67e940ee126cb08c1420b3c25f1
SHA1c902b5cbbe052b69b6f2c291846021e537f22d77
SHA25625c49ee82561993047f1ebf0a1f5cac9eabd8402ff6a087aa983e4a88dd4ade2
SHA5126e63d036fddffee1b59e19267349404ad210bbb607739f3ac139930e0e077573e921a14507feaf377ad0326d01e38f92ea4db0d5108f527b14ff9185b1f92fa1
-
\Windows\system\svchost.exeFilesize
287KB
MD5b609a85a5e17542b75c564c2ea80d448
SHA1b7220e52f9b0da1ff7b51317fe5c2e659e2fd851
SHA256348a99b2dbe32e7abe1d5a7d9515c09dd95e1a1c9fd0855784714706b654d6cc
SHA5122cef72229058b4e5c3f25303481a83a2ff6184edc8b1cf20083f3d963a54d35d0500e14c58c2806f4816a0608ee88db6d2e799c5202530e1c9f044815f28b7db
-
memory/1268-14-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/2008-120-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2008-87-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2040-106-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2040-112-0x0000000002C30000-0x0000000002C71000-memory.dmpFilesize
260KB
-
memory/2580-59-0x00000000029A0000-0x00000000029A1000-memory.dmpFilesize
4KB
-
memory/2580-244-0x00000000029A0000-0x00000000029A1000-memory.dmpFilesize
4KB
-
memory/2580-225-0x0000000003720000-0x0000000003721000-memory.dmpFilesize
4KB
-
memory/2668-49-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2668-72-0x00000000032A0000-0x00000000032E1000-memory.dmpFilesize
260KB
-
memory/2668-125-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2780-113-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2780-117-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2800-206-0x0000000003450000-0x00000000044DE000-memory.dmpFilesize
16.6MB
-
memory/2800-207-0x0000000003450000-0x00000000044DE000-memory.dmpFilesize
16.6MB
-
memory/2800-202-0x0000000003450000-0x00000000044DE000-memory.dmpFilesize
16.6MB
-
memory/2800-211-0x0000000003450000-0x00000000044DE000-memory.dmpFilesize
16.6MB
-
memory/2800-205-0x0000000003450000-0x00000000044DE000-memory.dmpFilesize
16.6MB
-
memory/2800-231-0x0000000002E50000-0x0000000002E51000-memory.dmpFilesize
4KB
-
memory/2800-204-0x0000000003450000-0x00000000044DE000-memory.dmpFilesize
16.6MB
-
memory/2800-73-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/3060-7-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-12-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-13-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-50-0x0000000005400000-0x0000000005441000-memory.dmpFilesize
260KB
-
memory/3060-91-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-132-0x0000000000330000-0x0000000000332000-memory.dmpFilesize
8KB
-
memory/3060-139-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/3060-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/3060-95-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-126-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-11-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-48-0x0000000005400000-0x0000000005441000-memory.dmpFilesize
260KB
-
memory/3060-23-0x0000000000330000-0x0000000000332000-memory.dmpFilesize
8KB
-
memory/3060-24-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/3060-26-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/3060-6-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-27-0x0000000000330000-0x0000000000332000-memory.dmpFilesize
8KB
-
memory/3060-28-0x0000000000330000-0x0000000000332000-memory.dmpFilesize
8KB
-
memory/3060-8-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-10-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-5-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-9-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB
-
memory/3060-102-0x00000000025D0000-0x000000000365E000-memory.dmpFilesize
16.6MB