Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
7e4ae7ad79eb2208f24f6bd3b073906442a0d1bff3f1d0eabfa4082291c5199b.dll
Resource
win7-20240419-en
General
-
Target
7e4ae7ad79eb2208f24f6bd3b073906442a0d1bff3f1d0eabfa4082291c5199b.dll
-
Size
120KB
-
MD5
177ad0142bac99db57cbbd700be8ed64
-
SHA1
7e1e555f2614a9973e6a8b37d4cc599f22ac1659
-
SHA256
7e4ae7ad79eb2208f24f6bd3b073906442a0d1bff3f1d0eabfa4082291c5199b
-
SHA512
b2c28b16c7de16394e01501292613182eaf99eac89c85a8b476bec44fd0560e347a0b3c96e84db4e4beca5544bec45cbb740b1731c9dc062e9178d3cf674749b
-
SSDEEP
3072:ZrmIh6eVBLMtUChADa5DnmkWZN0UcQb4d:ZXM2FMiKlDI/0U
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e578bc5.exee574a38.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e574a38.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e574a38.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e578bc5.exe -
Processes:
e578bc5.exee574a38.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574a38.exe -
Processes:
e574a38.exee578bc5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e578bc5.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 29 IoCs
Processes:
resource yara_rule behavioral2/memory/3040-8-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-28-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-31-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-24-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-33-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-34-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-10-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-11-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-9-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-6-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-35-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-36-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-37-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-38-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-43-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-44-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-46-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-47-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-57-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-63-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-64-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3040-67-0x0000000000750000-0x000000000180A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1648-90-0x0000000000830000-0x00000000018EA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1648-93-0x0000000000830000-0x00000000018EA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1648-92-0x0000000000830000-0x00000000018EA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1648-101-0x0000000000830000-0x00000000018EA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1648-95-0x0000000000830000-0x00000000018EA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1648-94-0x0000000000830000-0x00000000018EA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1648-140-0x0000000000830000-0x00000000018EA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3040-8-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-28-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/1528-30-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3040-31-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-24-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-33-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-34-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-10-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-11-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-9-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-6-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-35-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-36-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-37-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-38-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-43-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-44-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-46-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-47-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-57-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-63-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-64-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-67-0x0000000000750000-0x000000000180A000-memory.dmp UPX behavioral2/memory/3040-85-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1528-89-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1648-90-0x0000000000830000-0x00000000018EA000-memory.dmp UPX behavioral2/memory/1648-93-0x0000000000830000-0x00000000018EA000-memory.dmp UPX behavioral2/memory/1648-92-0x0000000000830000-0x00000000018EA000-memory.dmp UPX behavioral2/memory/1648-101-0x0000000000830000-0x00000000018EA000-memory.dmp UPX behavioral2/memory/1648-95-0x0000000000830000-0x00000000018EA000-memory.dmp UPX behavioral2/memory/1648-94-0x0000000000830000-0x00000000018EA000-memory.dmp UPX behavioral2/memory/1648-139-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1648-140-0x0000000000830000-0x00000000018EA000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e574a38.exee574b61.exee578bc5.exepid process 3040 e574a38.exe 1528 e574b61.exe 1648 e578bc5.exe -
Processes:
resource yara_rule behavioral2/memory/3040-8-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-28-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-31-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-24-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-33-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-34-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-10-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-11-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-9-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-6-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-35-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-36-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-37-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-38-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-43-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-44-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-46-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-47-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-57-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-63-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-64-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/3040-67-0x0000000000750000-0x000000000180A000-memory.dmp upx behavioral2/memory/1648-90-0x0000000000830000-0x00000000018EA000-memory.dmp upx behavioral2/memory/1648-93-0x0000000000830000-0x00000000018EA000-memory.dmp upx behavioral2/memory/1648-92-0x0000000000830000-0x00000000018EA000-memory.dmp upx behavioral2/memory/1648-101-0x0000000000830000-0x00000000018EA000-memory.dmp upx behavioral2/memory/1648-95-0x0000000000830000-0x00000000018EA000-memory.dmp upx behavioral2/memory/1648-94-0x0000000000830000-0x00000000018EA000-memory.dmp upx behavioral2/memory/1648-140-0x0000000000830000-0x00000000018EA000-memory.dmp upx -
Processes:
e574a38.exee578bc5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e574a38.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e578bc5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e578bc5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e578bc5.exe -
Processes:
e574a38.exee578bc5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e578bc5.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e574a38.exee578bc5.exedescription ioc process File opened (read-only) \??\E: e574a38.exe File opened (read-only) \??\G: e574a38.exe File opened (read-only) \??\H: e574a38.exe File opened (read-only) \??\I: e574a38.exe File opened (read-only) \??\J: e574a38.exe File opened (read-only) \??\E: e578bc5.exe File opened (read-only) \??\G: e578bc5.exe File opened (read-only) \??\H: e578bc5.exe -
Drops file in Windows directory 3 IoCs
Processes:
e574a38.exee578bc5.exedescription ioc process File created C:\Windows\e574aa5 e574a38.exe File opened for modification C:\Windows\SYSTEM.INI e574a38.exe File created C:\Windows\e57b371 e578bc5.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e574a38.exee578bc5.exepid process 3040 e574a38.exe 3040 e574a38.exe 3040 e574a38.exe 3040 e574a38.exe 1648 e578bc5.exe 1648 e578bc5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e574a38.exedescription pid process Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe Token: SeDebugPrivilege 3040 e574a38.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee574a38.exee578bc5.exedescription pid process target process PID 3104 wrote to memory of 1976 3104 rundll32.exe rundll32.exe PID 3104 wrote to memory of 1976 3104 rundll32.exe rundll32.exe PID 3104 wrote to memory of 1976 3104 rundll32.exe rundll32.exe PID 1976 wrote to memory of 3040 1976 rundll32.exe e574a38.exe PID 1976 wrote to memory of 3040 1976 rundll32.exe e574a38.exe PID 1976 wrote to memory of 3040 1976 rundll32.exe e574a38.exe PID 3040 wrote to memory of 772 3040 e574a38.exe fontdrvhost.exe PID 3040 wrote to memory of 776 3040 e574a38.exe fontdrvhost.exe PID 3040 wrote to memory of 332 3040 e574a38.exe dwm.exe PID 3040 wrote to memory of 2956 3040 e574a38.exe sihost.exe PID 3040 wrote to memory of 3000 3040 e574a38.exe svchost.exe PID 3040 wrote to memory of 2672 3040 e574a38.exe taskhostw.exe PID 3040 wrote to memory of 3420 3040 e574a38.exe Explorer.EXE PID 3040 wrote to memory of 3516 3040 e574a38.exe svchost.exe PID 3040 wrote to memory of 3728 3040 e574a38.exe DllHost.exe PID 3040 wrote to memory of 3820 3040 e574a38.exe StartMenuExperienceHost.exe PID 3040 wrote to memory of 3884 3040 e574a38.exe RuntimeBroker.exe PID 3040 wrote to memory of 3996 3040 e574a38.exe SearchApp.exe PID 3040 wrote to memory of 804 3040 e574a38.exe TextInputHost.exe PID 3040 wrote to memory of 1484 3040 e574a38.exe RuntimeBroker.exe PID 3040 wrote to memory of 2912 3040 e574a38.exe RuntimeBroker.exe PID 3040 wrote to memory of 4968 3040 e574a38.exe backgroundTaskHost.exe PID 3040 wrote to memory of 2228 3040 e574a38.exe backgroundTaskHost.exe PID 3040 wrote to memory of 3104 3040 e574a38.exe rundll32.exe PID 3040 wrote to memory of 1976 3040 e574a38.exe rundll32.exe PID 3040 wrote to memory of 1976 3040 e574a38.exe rundll32.exe PID 1976 wrote to memory of 1528 1976 rundll32.exe e574b61.exe PID 1976 wrote to memory of 1528 1976 rundll32.exe e574b61.exe PID 1976 wrote to memory of 1528 1976 rundll32.exe e574b61.exe PID 3040 wrote to memory of 772 3040 e574a38.exe fontdrvhost.exe PID 3040 wrote to memory of 776 3040 e574a38.exe fontdrvhost.exe PID 3040 wrote to memory of 332 3040 e574a38.exe dwm.exe PID 3040 wrote to memory of 2956 3040 e574a38.exe sihost.exe PID 3040 wrote to memory of 3000 3040 e574a38.exe svchost.exe PID 3040 wrote to memory of 2672 3040 e574a38.exe taskhostw.exe PID 3040 wrote to memory of 3420 3040 e574a38.exe Explorer.EXE PID 3040 wrote to memory of 3516 3040 e574a38.exe svchost.exe PID 3040 wrote to memory of 3728 3040 e574a38.exe DllHost.exe PID 3040 wrote to memory of 3820 3040 e574a38.exe StartMenuExperienceHost.exe PID 3040 wrote to memory of 3884 3040 e574a38.exe RuntimeBroker.exe PID 3040 wrote to memory of 3996 3040 e574a38.exe SearchApp.exe PID 3040 wrote to memory of 804 3040 e574a38.exe TextInputHost.exe PID 3040 wrote to memory of 1484 3040 e574a38.exe RuntimeBroker.exe PID 3040 wrote to memory of 2912 3040 e574a38.exe RuntimeBroker.exe PID 3040 wrote to memory of 4968 3040 e574a38.exe backgroundTaskHost.exe PID 3040 wrote to memory of 2228 3040 e574a38.exe backgroundTaskHost.exe PID 3040 wrote to memory of 3104 3040 e574a38.exe rundll32.exe PID 3040 wrote to memory of 1528 3040 e574a38.exe e574b61.exe PID 3040 wrote to memory of 1528 3040 e574a38.exe e574b61.exe PID 1976 wrote to memory of 1648 1976 rundll32.exe e578bc5.exe PID 1976 wrote to memory of 1648 1976 rundll32.exe e578bc5.exe PID 1976 wrote to memory of 1648 1976 rundll32.exe e578bc5.exe PID 1648 wrote to memory of 772 1648 e578bc5.exe fontdrvhost.exe PID 1648 wrote to memory of 776 1648 e578bc5.exe fontdrvhost.exe PID 1648 wrote to memory of 332 1648 e578bc5.exe dwm.exe PID 1648 wrote to memory of 2956 1648 e578bc5.exe sihost.exe PID 1648 wrote to memory of 3000 1648 e578bc5.exe svchost.exe PID 1648 wrote to memory of 2672 1648 e578bc5.exe taskhostw.exe PID 1648 wrote to memory of 3420 1648 e578bc5.exe Explorer.EXE PID 1648 wrote to memory of 3516 1648 e578bc5.exe svchost.exe PID 1648 wrote to memory of 3728 1648 e578bc5.exe DllHost.exe PID 1648 wrote to memory of 3820 1648 e578bc5.exe StartMenuExperienceHost.exe PID 1648 wrote to memory of 3884 1648 e578bc5.exe RuntimeBroker.exe PID 1648 wrote to memory of 3996 1648 e578bc5.exe SearchApp.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e574a38.exee578bc5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574a38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e578bc5.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:332
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3000
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2672
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e4ae7ad79eb2208f24f6bd3b073906442a0d1bff3f1d0eabfa4082291c5199b.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e4ae7ad79eb2208f24f6bd3b073906442a0d1bff3f1d0eabfa4082291c5199b.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\e574a38.exeC:\Users\Admin\AppData\Local\Temp\e574a38.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\e574b61.exeC:\Users\Admin\AppData\Local\Temp\e574b61.exe4⤵
- Executes dropped EXE
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\e578bc5.exeC:\Users\Admin\AppData\Local\Temp\e578bc5.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1648
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3516
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3728
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3820
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3884
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3996
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:804
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1484
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2912
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4968
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2228
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD53774a35da76ad4aa4be0cd01eccb703d
SHA1551b8e88f3228bd28a56265a3f1d88da6bcef7d7
SHA25649b0a19033dc0e0ecbca1945f84a42f0c9113ae77a72a1d3be37701101c212a9
SHA512ddb43db3605ac42d5e59084f958fe16fcfaece3d1cce742f620502e9282a3a1a0f15852701de23074066f8c438135019f0b6752d972890b81c3cc17bbc328506
-
Filesize
257B
MD553c279f043a5e9fe56e9fe65e5dccdba
SHA10b6b33668514caa6f23f54d6bf40f98ec8f9ed71
SHA256fd85b53b7c2a2046a74fd3e54d11871acea1e4bfcde161d58022562d4720c266
SHA512a61b348c2ff7c54290349e6d89d7874a1c26ea56bd5bb6789bc81e0f1c5a18df0dd1cfd6d4d0ad914ee04f6ca79a3ff253c3df43838a1327d1ea683e1bea1dfc