Analysis
-
max time kernel
131s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
695cb0b919b976efea93d06f71dfc710_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
695cb0b919b976efea93d06f71dfc710_NeikiAnalytics.dll
-
Size
120KB
-
MD5
695cb0b919b976efea93d06f71dfc710
-
SHA1
9ef5f862b557419041afcfc3597a3e8a8e7f05fe
-
SHA256
cb82ac1f25355ed3c0ab3ead0bb75688e98d39d49a31ffea2a9481dda51aa48f
-
SHA512
0f14e5256201d9b22548313c948f9dbbb536187758c0ccb6f752e2af15a26bfa4fba1348b38043f57b94ff72244b222f7d5c58a74c96ee058d3c0239cbdb6638
-
SSDEEP
1536:znGJz3crfYbKazZ++VNHhgBK5S/QVE81ChoxbKriFPM28zmsXD5gQ0j6siFl78T6:SJzOMzhIKcW3x2WFPM28lr0j6siGIB
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e57d7b3.exee581028.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e581028.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e581028.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57d7b3.exe -
Processes:
e57d7b3.exee581028.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e581028.exe -
Processes:
e57d7b3.exee581028.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57d7b3.exe -
Executes dropped EXE 3 IoCs
Processes:
e57d7b3.exee57d978.exee581028.exepid process 3244 e57d7b3.exe 4016 e57d978.exe 2892 e581028.exe -
Processes:
resource yara_rule behavioral2/memory/3244-6-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-20-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-19-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-10-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-32-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-33-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-34-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-9-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-11-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-35-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-36-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-37-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-38-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-43-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-44-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-46-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-55-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-57-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-58-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-60-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-62-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/3244-63-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/2892-90-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/2892-87-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/2892-89-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/2892-140-0x0000000000810000-0x00000000018CA000-memory.dmp upx -
Processes:
e581028.exee57d7b3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e581028.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57d7b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e581028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57d7b3.exe -
Processes:
e57d7b3.exee581028.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e581028.exe -
Enumerates connected drives 3 TTPs 11 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e57d7b3.exee581028.exedescription ioc process File opened (read-only) \??\I: e57d7b3.exe File opened (read-only) \??\J: e57d7b3.exe File opened (read-only) \??\G: e57d7b3.exe File opened (read-only) \??\H: e57d7b3.exe File opened (read-only) \??\E: e581028.exe File opened (read-only) \??\G: e581028.exe File opened (read-only) \??\H: e581028.exe File opened (read-only) \??\I: e581028.exe File opened (read-only) \??\J: e581028.exe File opened (read-only) \??\E: e57d7b3.exe File opened (read-only) \??\K: e57d7b3.exe -
Drops file in Windows directory 3 IoCs
Processes:
e57d7b3.exee581028.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI e57d7b3.exe File created C:\Windows\e583795 e581028.exe File created C:\Windows\e57d830 e57d7b3.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e57d7b3.exee581028.exepid process 3244 e57d7b3.exe 3244 e57d7b3.exe 3244 e57d7b3.exe 3244 e57d7b3.exe 2892 e581028.exe 2892 e581028.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e57d7b3.exedescription pid process Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe Token: SeDebugPrivilege 3244 e57d7b3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee57d7b3.exee581028.exedescription pid process target process PID 4276 wrote to memory of 3080 4276 rundll32.exe rundll32.exe PID 4276 wrote to memory of 3080 4276 rundll32.exe rundll32.exe PID 4276 wrote to memory of 3080 4276 rundll32.exe rundll32.exe PID 3080 wrote to memory of 3244 3080 rundll32.exe e57d7b3.exe PID 3080 wrote to memory of 3244 3080 rundll32.exe e57d7b3.exe PID 3080 wrote to memory of 3244 3080 rundll32.exe e57d7b3.exe PID 3244 wrote to memory of 776 3244 e57d7b3.exe fontdrvhost.exe PID 3244 wrote to memory of 784 3244 e57d7b3.exe fontdrvhost.exe PID 3244 wrote to memory of 60 3244 e57d7b3.exe dwm.exe PID 3244 wrote to memory of 2644 3244 e57d7b3.exe sihost.exe PID 3244 wrote to memory of 2652 3244 e57d7b3.exe svchost.exe PID 3244 wrote to memory of 2748 3244 e57d7b3.exe taskhostw.exe PID 3244 wrote to memory of 3480 3244 e57d7b3.exe Explorer.EXE PID 3244 wrote to memory of 3612 3244 e57d7b3.exe svchost.exe PID 3244 wrote to memory of 3792 3244 e57d7b3.exe DllHost.exe PID 3244 wrote to memory of 3880 3244 e57d7b3.exe StartMenuExperienceHost.exe PID 3244 wrote to memory of 3948 3244 e57d7b3.exe RuntimeBroker.exe PID 3244 wrote to memory of 4040 3244 e57d7b3.exe SearchApp.exe PID 3244 wrote to memory of 3868 3244 e57d7b3.exe RuntimeBroker.exe PID 3244 wrote to memory of 2272 3244 e57d7b3.exe TextInputHost.exe PID 3244 wrote to memory of 4356 3244 e57d7b3.exe RuntimeBroker.exe PID 3244 wrote to memory of 3352 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 3808 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 2440 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 1252 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 2744 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 4276 3244 e57d7b3.exe rundll32.exe PID 3244 wrote to memory of 3080 3244 e57d7b3.exe rundll32.exe PID 3244 wrote to memory of 3080 3244 e57d7b3.exe rundll32.exe PID 3244 wrote to memory of 3060 3244 e57d7b3.exe backgroundTaskHost.exe PID 3244 wrote to memory of 396 3244 e57d7b3.exe backgroundTaskHost.exe PID 3080 wrote to memory of 4016 3080 rundll32.exe e57d978.exe PID 3080 wrote to memory of 4016 3080 rundll32.exe e57d978.exe PID 3080 wrote to memory of 4016 3080 rundll32.exe e57d978.exe PID 3244 wrote to memory of 776 3244 e57d7b3.exe fontdrvhost.exe PID 3244 wrote to memory of 784 3244 e57d7b3.exe fontdrvhost.exe PID 3244 wrote to memory of 60 3244 e57d7b3.exe dwm.exe PID 3244 wrote to memory of 2644 3244 e57d7b3.exe sihost.exe PID 3244 wrote to memory of 2652 3244 e57d7b3.exe svchost.exe PID 3244 wrote to memory of 2748 3244 e57d7b3.exe taskhostw.exe PID 3244 wrote to memory of 3480 3244 e57d7b3.exe Explorer.EXE PID 3244 wrote to memory of 3612 3244 e57d7b3.exe svchost.exe PID 3244 wrote to memory of 3792 3244 e57d7b3.exe DllHost.exe PID 3244 wrote to memory of 3880 3244 e57d7b3.exe StartMenuExperienceHost.exe PID 3244 wrote to memory of 3948 3244 e57d7b3.exe RuntimeBroker.exe PID 3244 wrote to memory of 4040 3244 e57d7b3.exe SearchApp.exe PID 3244 wrote to memory of 3868 3244 e57d7b3.exe RuntimeBroker.exe PID 3244 wrote to memory of 2272 3244 e57d7b3.exe TextInputHost.exe PID 3244 wrote to memory of 4356 3244 e57d7b3.exe RuntimeBroker.exe PID 3244 wrote to memory of 3352 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 3808 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 2440 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 1252 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 2744 3244 e57d7b3.exe msedge.exe PID 3244 wrote to memory of 4276 3244 e57d7b3.exe rundll32.exe PID 3244 wrote to memory of 3060 3244 e57d7b3.exe backgroundTaskHost.exe PID 3244 wrote to memory of 396 3244 e57d7b3.exe backgroundTaskHost.exe PID 3244 wrote to memory of 4016 3244 e57d7b3.exe e57d978.exe PID 3244 wrote to memory of 4016 3244 e57d7b3.exe e57d978.exe PID 3244 wrote to memory of 596 3244 e57d7b3.exe msedge.exe PID 3080 wrote to memory of 2892 3080 rundll32.exe e581028.exe PID 3080 wrote to memory of 2892 3080 rundll32.exe e581028.exe PID 3080 wrote to memory of 2892 3080 rundll32.exe e581028.exe PID 2892 wrote to memory of 776 2892 e581028.exe fontdrvhost.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e57d7b3.exee581028.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57d7b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e581028.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:60
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2652
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2748
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3480
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\695cb0b919b976efea93d06f71dfc710_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\695cb0b919b976efea93d06f71dfc710_NeikiAnalytics.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\e57d7b3.exeC:\Users\Admin\AppData\Local\Temp\e57d7b3.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\e57d978.exeC:\Users\Admin\AppData\Local\Temp\e57d978.exe4⤵
- Executes dropped EXE
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\e581028.exeC:\Users\Admin\AppData\Local\Temp\e581028.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2892
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3612
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3792
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3880
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3948
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4040
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3868
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2272
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:3352
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffef866ceb8,0x7ffef866cec4,0x7ffef866ced02⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2284,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=2356 /prefetch:32⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2312,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1304,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:82⤵PID:596
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3060
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:396
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD59faa82f58b96342c1848e44428133194
SHA143cb1f1f9aa00a2f8e16ee74e812c6f31c0796d4
SHA25608e7e2daaeb513f37bca7285ba87469361d24ddbdd3e51e3b3c5f0da4fb458b0
SHA512d7a53438b5a5fe7e6d4f8ae6ee966a01cc3396fe9e7680a6e8071cd4c27cfd0d5b55eb91cc8a9afe07f55e7c0423d9a2b9db1431afc0508f79d40f9bfb771375
-
Filesize
256B
MD5da92849969409b57db1d05f99b7d1303
SHA13d21786687d90b06ad8a14b8885ea5ac8a567a50
SHA25625290ad6feaac8e671f1603833282af9caebcaaf62090b49d2236819c555c85c
SHA512609f472474712db926ce5d7f8bcd882692764decfb88836efbb9e8965dd10b49e98935f49eef3dac398128801ea3f6c5b838d3c789f1c8920a18c10ba3ac9e29