Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe
Resource
win7-20240508-en
General
-
Target
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe
-
Size
1.2MB
-
MD5
e17bf1770bab7aae01b11e7a3558f31a
-
SHA1
d00ec77c77c62118cad0f5658a976d0e0a88b467
-
SHA256
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d
-
SHA512
263c27108ed3a8f1fd50c8fe23ef2ae1166328046079a1d425c20823fc70b4ff1f6b7b4c284fd8980b1533b3d55deaa4afa1fec7c1049af1adaa3d46869e18fc
-
SSDEEP
24576:7qo1V4IDQ1rThff+r/ibJIRYP6h95C+VlLExqWXTHRyWtv4r6Ps:7qoTDerQKwC+vExqWXTxyWF4r6Ps
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Processes:
resource yara_rule behavioral1/memory/492-1-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-2-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-5-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-18-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-16-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-20-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-19-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-15-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-14-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-21-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-17-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-41-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-42-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-43-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-44-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-45-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-47-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-48-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-59-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-65-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-68-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-69-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-70-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-77-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-86-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-88-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-90-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-92-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/492-187-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx -
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process File opened (read-only) \??\L: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\M: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\O: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\R: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\E: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\U: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\X: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\Y: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\Z: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\J: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\K: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\N: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\T: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\Q: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\S: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\V: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\W: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\G: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\H: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\I: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened (read-only) \??\P: e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process File opened for modification C:\autorun.inf e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened for modification F:\autorun.inf e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Drops file in Program Files directory 1 IoCs
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Drops file in Windows directory 2 IoCs
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process File created C:\Windows\f761d60 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe File opened for modification C:\Windows\SYSTEM.INI e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exepid process 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription pid process Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Token: SeDebugPrivilege 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription pid process target process PID 492 wrote to memory of 1112 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe taskhost.exe PID 492 wrote to memory of 1164 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Dwm.exe PID 492 wrote to memory of 1188 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Explorer.EXE PID 492 wrote to memory of 1936 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe PID 492 wrote to memory of 1112 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe taskhost.exe PID 492 wrote to memory of 1164 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Dwm.exe PID 492 wrote to memory of 1188 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Explorer.EXE PID 492 wrote to memory of 1936 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe PID 492 wrote to memory of 2760 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe PID 492 wrote to memory of 1112 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe taskhost.exe PID 492 wrote to memory of 1164 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Dwm.exe PID 492 wrote to memory of 1188 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Explorer.EXE PID 492 wrote to memory of 1936 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe PID 492 wrote to memory of 1112 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe taskhost.exe PID 492 wrote to memory of 1164 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Dwm.exe PID 492 wrote to memory of 1188 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Explorer.EXE PID 492 wrote to memory of 1936 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe PID 492 wrote to memory of 1112 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe taskhost.exe PID 492 wrote to memory of 1164 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Dwm.exe PID 492 wrote to memory of 1188 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Explorer.EXE PID 492 wrote to memory of 1936 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe PID 492 wrote to memory of 1112 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe taskhost.exe PID 492 wrote to memory of 1164 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Dwm.exe PID 492 wrote to memory of 1188 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Explorer.EXE PID 492 wrote to memory of 1936 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe PID 492 wrote to memory of 1112 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe taskhost.exe PID 492 wrote to memory of 1164 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Dwm.exe PID 492 wrote to memory of 1188 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe Explorer.EXE PID 492 wrote to memory of 1936 492 e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe DllHost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe"C:\Users\Admin\AppData\Local\Temp\e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:492
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1936
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD599fb8e84b8aa92889349054a60e1f359
SHA11b3dd1afb4fe4533ca16db4dd3e7845c13b0e1c5
SHA2565313e624a817ebcb34675027d12b87465de4fc4fdddfdd74d244490c4911b8e4
SHA5122a99095109445c3ca1b9fad5c87fdfed331641401ca8d19d3ab4d109e18b9dc5feb739485f14f390bd3bcfa3a4325e3b1278fe1bb8690dd8df16edb9af52faac
-
Filesize
97KB
MD5cafe26bf473f8869bc24089302f3943f
SHA1ae35129ba45d87b1b14c35f5862680ce9b109219
SHA2567ad037610544842d402de95a2c64189c0bd8b6e46b99c78e9ec079a5742226a3
SHA512384694743e5b83cb9a6d2c3653fe1ab7350c8729ad390fa58dc45e41338e10c125f9ea7ca57bd9eb65ce764a5831f672816c87bcd7b69657d8dd1e2af62c398b