Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
64548fead889deb186a50063950eb570_NeikiAnalytics.dll
Resource
win7-20240220-en
General
-
Target
64548fead889deb186a50063950eb570_NeikiAnalytics.dll
-
Size
120KB
-
MD5
64548fead889deb186a50063950eb570
-
SHA1
00014330a9752b0db9fc211304ab87db09ffae1a
-
SHA256
975896c1dd08536b4787c3034af071a66d191601e69ed0e4a8d0d6d552723866
-
SHA512
177e6897bd9f0b87c5cd141548122af3238661ef00008adc1756925a62f94f1f8280bcaad48da275b995626ecb7240f6c3ad5756e9f39218f1a9e809ce5b69e9
-
SSDEEP
1536:rBjWPXhjJi+zAQ/bQCBNkAiqj4FE2dxxYQOMwLnTWIqWebEwg:rBCvhjY+p/cCnkAt4tElxjTxe4b
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e5743a0.exee576716.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e576716.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e576716.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5743a0.exe -
Processes:
e5743a0.exee576716.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576716.exe -
Processes:
e5743a0.exee576716.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5743a0.exe -
Executes dropped EXE 3 IoCs
Processes:
e5743a0.exee574517.exee576716.exepid process 2508 e5743a0.exe 2936 e574517.exe 4464 e576716.exe -
Processes:
resource yara_rule behavioral2/memory/2508-8-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-6-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-11-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-25-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-24-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-23-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-12-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-22-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-10-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-32-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-37-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-36-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-38-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-39-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-40-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-58-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-59-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-60-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-62-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-64-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-65-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-66-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-69-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-76-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/2508-80-0x0000000000880000-0x000000000193A000-memory.dmp upx behavioral2/memory/4464-124-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx -
Processes:
e5743a0.exee576716.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5743a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e576716.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e576716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e576716.exe -
Processes:
e5743a0.exee576716.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576716.exe -
Enumerates connected drives 3 TTPs 9 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e5743a0.exedescription ioc process File opened (read-only) \??\N: e5743a0.exe File opened (read-only) \??\E: e5743a0.exe File opened (read-only) \??\G: e5743a0.exe File opened (read-only) \??\H: e5743a0.exe File opened (read-only) \??\I: e5743a0.exe File opened (read-only) \??\J: e5743a0.exe File opened (read-only) \??\M: e5743a0.exe File opened (read-only) \??\K: e5743a0.exe File opened (read-only) \??\L: e5743a0.exe -
Drops file in Program Files directory 3 IoCs
Processes:
e5743a0.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e5743a0.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e5743a0.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e5743a0.exe -
Drops file in Windows directory 3 IoCs
Processes:
e5743a0.exee576716.exedescription ioc process File created C:\Windows\e5743df e5743a0.exe File opened for modification C:\Windows\SYSTEM.INI e5743a0.exe File created C:\Windows\e57b6dc e576716.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e5743a0.exepid process 2508 e5743a0.exe 2508 e5743a0.exe 2508 e5743a0.exe 2508 e5743a0.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e5743a0.exedescription pid process Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe Token: SeDebugPrivilege 2508 e5743a0.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
rundll32.exerundll32.exee5743a0.exedescription pid process target process PID 1180 wrote to memory of 5032 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 5032 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 5032 1180 rundll32.exe rundll32.exe PID 5032 wrote to memory of 2508 5032 rundll32.exe e5743a0.exe PID 5032 wrote to memory of 2508 5032 rundll32.exe e5743a0.exe PID 5032 wrote to memory of 2508 5032 rundll32.exe e5743a0.exe PID 2508 wrote to memory of 808 2508 e5743a0.exe fontdrvhost.exe PID 2508 wrote to memory of 816 2508 e5743a0.exe fontdrvhost.exe PID 2508 wrote to memory of 376 2508 e5743a0.exe dwm.exe PID 2508 wrote to memory of 2428 2508 e5743a0.exe sihost.exe PID 2508 wrote to memory of 2464 2508 e5743a0.exe svchost.exe PID 2508 wrote to memory of 2668 2508 e5743a0.exe taskhostw.exe PID 2508 wrote to memory of 3384 2508 e5743a0.exe Explorer.EXE PID 2508 wrote to memory of 3536 2508 e5743a0.exe svchost.exe PID 2508 wrote to memory of 3748 2508 e5743a0.exe DllHost.exe PID 2508 wrote to memory of 3844 2508 e5743a0.exe StartMenuExperienceHost.exe PID 2508 wrote to memory of 3908 2508 e5743a0.exe RuntimeBroker.exe PID 2508 wrote to memory of 4000 2508 e5743a0.exe SearchApp.exe PID 2508 wrote to memory of 4144 2508 e5743a0.exe RuntimeBroker.exe PID 2508 wrote to memory of 4468 2508 e5743a0.exe RuntimeBroker.exe PID 2508 wrote to memory of 2860 2508 e5743a0.exe TextInputHost.exe PID 2508 wrote to memory of 4920 2508 e5743a0.exe backgroundTaskHost.exe PID 2508 wrote to memory of 3636 2508 e5743a0.exe backgroundTaskHost.exe PID 2508 wrote to memory of 1180 2508 e5743a0.exe rundll32.exe PID 2508 wrote to memory of 5032 2508 e5743a0.exe rundll32.exe PID 2508 wrote to memory of 5032 2508 e5743a0.exe rundll32.exe PID 5032 wrote to memory of 2936 5032 rundll32.exe e574517.exe PID 5032 wrote to memory of 2936 5032 rundll32.exe e574517.exe PID 5032 wrote to memory of 2936 5032 rundll32.exe e574517.exe PID 5032 wrote to memory of 4464 5032 rundll32.exe e576716.exe PID 5032 wrote to memory of 4464 5032 rundll32.exe e576716.exe PID 5032 wrote to memory of 4464 5032 rundll32.exe e576716.exe PID 2508 wrote to memory of 808 2508 e5743a0.exe fontdrvhost.exe PID 2508 wrote to memory of 816 2508 e5743a0.exe fontdrvhost.exe PID 2508 wrote to memory of 376 2508 e5743a0.exe dwm.exe PID 2508 wrote to memory of 2428 2508 e5743a0.exe sihost.exe PID 2508 wrote to memory of 2464 2508 e5743a0.exe svchost.exe PID 2508 wrote to memory of 2668 2508 e5743a0.exe taskhostw.exe PID 2508 wrote to memory of 3384 2508 e5743a0.exe Explorer.EXE PID 2508 wrote to memory of 3536 2508 e5743a0.exe svchost.exe PID 2508 wrote to memory of 3748 2508 e5743a0.exe DllHost.exe PID 2508 wrote to memory of 3844 2508 e5743a0.exe StartMenuExperienceHost.exe PID 2508 wrote to memory of 3908 2508 e5743a0.exe RuntimeBroker.exe PID 2508 wrote to memory of 4000 2508 e5743a0.exe SearchApp.exe PID 2508 wrote to memory of 4144 2508 e5743a0.exe RuntimeBroker.exe PID 2508 wrote to memory of 4468 2508 e5743a0.exe RuntimeBroker.exe PID 2508 wrote to memory of 2860 2508 e5743a0.exe TextInputHost.exe PID 2508 wrote to memory of 4920 2508 e5743a0.exe backgroundTaskHost.exe PID 2508 wrote to memory of 3636 2508 e5743a0.exe backgroundTaskHost.exe PID 2508 wrote to memory of 2936 2508 e5743a0.exe e574517.exe PID 2508 wrote to memory of 2936 2508 e5743a0.exe e574517.exe PID 2508 wrote to memory of 4464 2508 e5743a0.exe e576716.exe PID 2508 wrote to memory of 4464 2508 e5743a0.exe e576716.exe PID 2508 wrote to memory of 4736 2508 e5743a0.exe BackgroundTaskHost.exe PID 2508 wrote to memory of 2960 2508 e5743a0.exe RuntimeBroker.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e5743a0.exee576716.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576716.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:808
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:816
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:376
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2464
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2668
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3384
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64548fead889deb186a50063950eb570_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64548fead889deb186a50063950eb570_NeikiAnalytics.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\e5743a0.exeC:\Users\Admin\AppData\Local\Temp\e5743a0.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\e574517.exeC:\Users\Admin\AppData\Local\Temp\e574517.exe4⤵
- Executes dropped EXE
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\e576716.exeC:\Users\Admin\AppData\Local\Temp\e576716.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:4464
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3536
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3748
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3844
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3908
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4000
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4144
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4468
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2860
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4920
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3636
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵PID:4736
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5f52f3e4082a954d6cf619293b7fe619c
SHA1045a64dc2d78c5da04d1b7cfec977cec4c3eb26b
SHA2567061d789350ed55a7032b0b9a82f25f299b5263b1bf4e975e7edced99c3b1703
SHA5127a3d7b92c08dfed70ed14608e4c25fb98d51594b28aa2d3c137eb101cbf9639aa64a67b8dc443002940b5a85b0f600c3737aced84a02c2a37f2db8a1159707f7
-
Filesize
257B
MD5839b278fcb21ef5dcf72302cac86b91e
SHA1c592df339d32c69a5c65569aac9fbffb56f7c6ac
SHA256c8fb0b42a4db62fc2e89499e898906b2e0a20d4ffc0c653f655e9a5aa7a85823
SHA5129ba838c92d16af19a2ecf1b15124d4721f87e5b0887b4e0e2c2aeccdd5e894366c3c1db0e45ddfd3a52f9c706823fed7b0b0c4efc282864726e9b8949a28a9e6