Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
3ba8db550c52e2a5bb6af8b72723c940_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
3ba8db550c52e2a5bb6af8b72723c940_NeikiAnalytics.dll
-
Size
120KB
-
MD5
3ba8db550c52e2a5bb6af8b72723c940
-
SHA1
86f78e00a922b4020ffbca4c54cc72aba18ab833
-
SHA256
d4dd43f8d585666709637c7fecfa7294d1fce970140720e5ead8f3184ef5a8e3
-
SHA512
f85d6a4d54b53a9a1d5b2c0f1223b8fb42aab646383931b8c0ca6309fdfd2d4954aa2dcddbaec956ac6c58d6313ec183824f4334a2d175cc1674e2cb4deffae6
-
SSDEEP
1536:mm9tXq4HR00xxyeliOVBgfn2udUdvW2J5VtdplKjvHKXp2rVh3C+isr7s:X9N00aelizn260+wcjHK52TC7Cs
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e582ae3.exee57f59b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57f59b.exe -
Processes:
e57f59b.exee582ae3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e582ae3.exe -
Processes:
e57f59b.exee582ae3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e582ae3.exe -
Executes dropped EXE 4 IoCs
Processes:
e57f59b.exee57f702.exee582ae3.exee582b03.exepid process 4168 e57f59b.exe 996 e57f702.exe 2184 e582ae3.exe 2616 e582b03.exe -
Processes:
resource yara_rule behavioral2/memory/4168-8-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-9-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-11-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-12-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-10-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-20-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-33-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-23-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-34-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-35-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-36-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-37-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-38-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-39-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-40-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-53-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-60-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-61-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-64-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-65-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-71-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-72-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/4168-84-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/2184-98-0x0000000000860000-0x000000000191A000-memory.dmp upx behavioral2/memory/2184-101-0x0000000000860000-0x000000000191A000-memory.dmp upx behavioral2/memory/2184-113-0x0000000000860000-0x000000000191A000-memory.dmp upx behavioral2/memory/2184-100-0x0000000000860000-0x000000000191A000-memory.dmp upx behavioral2/memory/2184-156-0x0000000000860000-0x000000000191A000-memory.dmp upx -
Processes:
e582ae3.exee57f59b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e582ae3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e582ae3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57f59b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e582ae3.exe -
Processes:
e57f59b.exee582ae3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e582ae3.exe -
Enumerates connected drives 3 TTPs 11 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e57f59b.exee582ae3.exedescription ioc process File opened (read-only) \??\J: e57f59b.exe File opened (read-only) \??\K: e57f59b.exe File opened (read-only) \??\L: e57f59b.exe File opened (read-only) \??\G: e582ae3.exe File opened (read-only) \??\I: e582ae3.exe File opened (read-only) \??\I: e57f59b.exe File opened (read-only) \??\G: e57f59b.exe File opened (read-only) \??\H: e57f59b.exe File opened (read-only) \??\E: e582ae3.exe File opened (read-only) \??\H: e582ae3.exe File opened (read-only) \??\E: e57f59b.exe -
Drops file in Windows directory 3 IoCs
Processes:
e57f59b.exee582ae3.exedescription ioc process File created C:\Windows\e57f618 e57f59b.exe File opened for modification C:\Windows\SYSTEM.INI e57f59b.exe File created C:\Windows\e585251 e582ae3.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e57f59b.exee582ae3.exepid process 4168 e57f59b.exe 4168 e57f59b.exe 4168 e57f59b.exe 4168 e57f59b.exe 2184 e582ae3.exe 2184 e582ae3.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e57f59b.exedescription pid process Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe Token: SeDebugPrivilege 4168 e57f59b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee57f59b.exedescription pid process target process PID 3460 wrote to memory of 3856 3460 rundll32.exe rundll32.exe PID 3460 wrote to memory of 3856 3460 rundll32.exe rundll32.exe PID 3460 wrote to memory of 3856 3460 rundll32.exe rundll32.exe PID 3856 wrote to memory of 4168 3856 rundll32.exe e57f59b.exe PID 3856 wrote to memory of 4168 3856 rundll32.exe e57f59b.exe PID 3856 wrote to memory of 4168 3856 rundll32.exe e57f59b.exe PID 4168 wrote to memory of 772 4168 e57f59b.exe fontdrvhost.exe PID 4168 wrote to memory of 780 4168 e57f59b.exe fontdrvhost.exe PID 4168 wrote to memory of 1016 4168 e57f59b.exe dwm.exe PID 4168 wrote to memory of 2520 4168 e57f59b.exe sihost.exe PID 4168 wrote to memory of 2560 4168 e57f59b.exe svchost.exe PID 4168 wrote to memory of 2648 4168 e57f59b.exe taskhostw.exe PID 4168 wrote to memory of 3524 4168 e57f59b.exe Explorer.EXE PID 4168 wrote to memory of 3648 4168 e57f59b.exe svchost.exe PID 4168 wrote to memory of 3836 4168 e57f59b.exe DllHost.exe PID 4168 wrote to memory of 3980 4168 e57f59b.exe StartMenuExperienceHost.exe PID 4168 wrote to memory of 4048 4168 e57f59b.exe RuntimeBroker.exe PID 4168 wrote to memory of 940 4168 e57f59b.exe SearchApp.exe PID 4168 wrote to memory of 3952 4168 e57f59b.exe RuntimeBroker.exe PID 4168 wrote to memory of 2436 4168 e57f59b.exe TextInputHost.exe PID 4168 wrote to memory of 5096 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 4000 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 1884 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 4756 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 4512 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 1912 4168 e57f59b.exe RuntimeBroker.exe PID 4168 wrote to memory of 3920 4168 e57f59b.exe backgroundTaskHost.exe PID 4168 wrote to memory of 2448 4168 e57f59b.exe backgroundTaskHost.exe PID 4168 wrote to memory of 3460 4168 e57f59b.exe rundll32.exe PID 4168 wrote to memory of 3856 4168 e57f59b.exe rundll32.exe PID 4168 wrote to memory of 3856 4168 e57f59b.exe rundll32.exe PID 3856 wrote to memory of 996 3856 rundll32.exe e57f702.exe PID 3856 wrote to memory of 996 3856 rundll32.exe e57f702.exe PID 3856 wrote to memory of 996 3856 rundll32.exe e57f702.exe PID 4168 wrote to memory of 772 4168 e57f59b.exe fontdrvhost.exe PID 4168 wrote to memory of 780 4168 e57f59b.exe fontdrvhost.exe PID 4168 wrote to memory of 1016 4168 e57f59b.exe dwm.exe PID 4168 wrote to memory of 2520 4168 e57f59b.exe sihost.exe PID 4168 wrote to memory of 2560 4168 e57f59b.exe svchost.exe PID 4168 wrote to memory of 2648 4168 e57f59b.exe taskhostw.exe PID 4168 wrote to memory of 3524 4168 e57f59b.exe Explorer.EXE PID 4168 wrote to memory of 3648 4168 e57f59b.exe svchost.exe PID 4168 wrote to memory of 3836 4168 e57f59b.exe DllHost.exe PID 4168 wrote to memory of 3980 4168 e57f59b.exe StartMenuExperienceHost.exe PID 4168 wrote to memory of 4048 4168 e57f59b.exe RuntimeBroker.exe PID 4168 wrote to memory of 940 4168 e57f59b.exe SearchApp.exe PID 4168 wrote to memory of 3952 4168 e57f59b.exe RuntimeBroker.exe PID 4168 wrote to memory of 2436 4168 e57f59b.exe TextInputHost.exe PID 4168 wrote to memory of 5096 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 4000 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 1884 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 4756 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 4512 4168 e57f59b.exe msedge.exe PID 4168 wrote to memory of 1912 4168 e57f59b.exe RuntimeBroker.exe PID 4168 wrote to memory of 3920 4168 e57f59b.exe backgroundTaskHost.exe PID 4168 wrote to memory of 2448 4168 e57f59b.exe backgroundTaskHost.exe PID 4168 wrote to memory of 3460 4168 e57f59b.exe rundll32.exe PID 4168 wrote to memory of 996 4168 e57f59b.exe e57f702.exe PID 4168 wrote to memory of 996 4168 e57f59b.exe e57f702.exe PID 3856 wrote to memory of 2184 3856 rundll32.exe e582ae3.exe PID 3856 wrote to memory of 2184 3856 rundll32.exe e582ae3.exe PID 3856 wrote to memory of 2184 3856 rundll32.exe e582ae3.exe PID 3856 wrote to memory of 2616 3856 rundll32.exe e582b03.exe PID 3856 wrote to memory of 2616 3856 rundll32.exe e582b03.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e57f59b.exee582ae3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57f59b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e582ae3.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1016
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2560
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2648
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ba8db550c52e2a5bb6af8b72723c940_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ba8db550c52e2a5bb6af8b72723c940_NeikiAnalytics.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\e57f59b.exeC:\Users\Admin\AppData\Local\Temp\e57f59b.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\e57f702.exeC:\Users\Admin\AppData\Local\Temp\e57f702.exe4⤵
- Executes dropped EXE
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\e582ae3.exeC:\Users\Admin\AppData\Local\Temp\e582ae3.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\e582b03.exeC:\Users\Admin\AppData\Local\Temp\e582b03.exe4⤵
- Executes dropped EXE
PID:2616
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3648
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3836
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3980
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4048
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:940
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3952
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:5096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff8390dceb8,0x7ff8390dcec4,0x7ff8390dced02⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2264,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1948,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=2556 /prefetch:32⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2400,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4084,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4088 /prefetch:82⤵PID:4688
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1912
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3920
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2448
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5d8948838c30d39a30a7e47c311e9255b
SHA18d8fe49268b1c7f8e69de2fb913ae799c2a1b14d
SHA2565cff771fb739bf8c2e8ec7d741b1e0d7ca1324a6efe34f5680a813e7ff3c8632
SHA512c3ecf28e67ab9a5b777f95ce0a2b93e0cdb2797bd142b8434b935b87874c935677b4379ecbc0ba435413778dfe5b3d741e558f9ff0d13f6fba9fa1c8a7bfa28f
-
Filesize
256B
MD5b2b3ca5e0561805a1fff7343f9eeee07
SHA10df2c655628a82958a35d39df1b5b43baabc7983
SHA2561053ce31f6b92b3eeadbfdc7a1d90d1544e1d733b2bd77a94b4f142110d9113c
SHA51206ebce2409ca15dfc7f67c975b6eea6942e397c68045a73654f4b146bc3678f7c34319bcaf3898f071da01accfdf400b765a65ea23ab34898b922b95a2edcee4