Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 23:19
Static task
static1
Behavioral task
behavioral1
Sample
702879f5c9ebf4b99e8f354232b59110643c158b8a433ac392ac153bf1f6c957.dll
Resource
win7-20240221-en
General
-
Target
702879f5c9ebf4b99e8f354232b59110643c158b8a433ac392ac153bf1f6c957.dll
-
Size
120KB
-
MD5
1d5e4aa98af73d4d9f549c0c861aae3f
-
SHA1
379de07bfeac87f6082483f65c2baacd5642aef8
-
SHA256
702879f5c9ebf4b99e8f354232b59110643c158b8a433ac392ac153bf1f6c957
-
SHA512
b39a5619212087578d23067e6f06410af0d8eac629334c5d205a01c07e9bc838b454562bc8ea520dee1101eeb8495b417122a82298864aa9380d0659f5a74179
-
SSDEEP
3072:d+b1SKboRixf5r8eJlbVonmuaaQRnQNS:sADU6SpVomTfQ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e575592.exee577e09.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e575592.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e575592.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e577e09.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e577e09.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e577e09.exe -
Processes:
e575592.exee577e09.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e577e09.exe -
Processes:
e575592.exee577e09.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e577e09.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 29 IoCs
Processes:
resource yara_rule behavioral2/memory/940-9-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-6-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-24-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-25-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-26-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-33-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-11-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-27-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-10-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-35-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-36-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-37-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-39-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-38-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-40-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-42-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-59-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-60-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-62-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-64-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-65-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-66-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-69-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-72-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-73-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-74-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/940-77-0x00000000008F0000-0x00000000019AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1908-114-0x0000000000B60000-0x0000000001C1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1908-147-0x0000000000B60000-0x0000000001C1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 34 IoCs
Processes:
resource yara_rule behavioral2/memory/940-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/940-9-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-6-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-24-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/456-34-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/940-25-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-26-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-33-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-11-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-27-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-10-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-35-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-36-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-37-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-39-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-38-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-40-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-42-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/1908-50-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/940-59-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-60-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-62-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-64-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-65-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-66-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-69-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-72-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-73-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-74-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/940-94-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/940-77-0x00000000008F0000-0x00000000019AA000-memory.dmp UPX behavioral2/memory/1908-114-0x0000000000B60000-0x0000000001C1A000-memory.dmp UPX behavioral2/memory/1908-147-0x0000000000B60000-0x0000000001C1A000-memory.dmp UPX behavioral2/memory/1908-148-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e575592.exee57569c.exee577e09.exepid process 940 e575592.exe 456 e57569c.exe 1908 e577e09.exe -
Processes:
resource yara_rule behavioral2/memory/940-9-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-6-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-24-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-25-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-26-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-33-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-11-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-27-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-10-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-35-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-36-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-37-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-39-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-38-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-40-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-42-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-59-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-60-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-62-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-64-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-65-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-66-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-69-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-72-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-73-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-74-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/940-77-0x00000000008F0000-0x00000000019AA000-memory.dmp upx behavioral2/memory/1908-114-0x0000000000B60000-0x0000000001C1A000-memory.dmp upx behavioral2/memory/1908-147-0x0000000000B60000-0x0000000001C1A000-memory.dmp upx -
Processes:
e577e09.exee575592.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575592.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e575592.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e577e09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e577e09.exe -
Processes:
e575592.exee577e09.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e577e09.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e577e09.exee575592.exedescription ioc process File opened (read-only) \??\I: e577e09.exe File opened (read-only) \??\I: e575592.exe File opened (read-only) \??\E: e577e09.exe File opened (read-only) \??\H: e577e09.exe File opened (read-only) \??\G: e577e09.exe File opened (read-only) \??\J: e577e09.exe File opened (read-only) \??\G: e575592.exe File opened (read-only) \??\H: e575592.exe File opened (read-only) \??\K: e575592.exe File opened (read-only) \??\O: e575592.exe File opened (read-only) \??\J: e575592.exe File opened (read-only) \??\L: e575592.exe File opened (read-only) \??\N: e575592.exe File opened (read-only) \??\E: e575592.exe File opened (read-only) \??\M: e575592.exe -
Drops file in Program Files directory 3 IoCs
Processes:
e575592.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zFM.exe e575592.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e575592.exe File opened for modification C:\Program Files\7-Zip\7z.exe e575592.exe -
Drops file in Windows directory 3 IoCs
Processes:
e575592.exee577e09.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI e575592.exe File created C:\Windows\e57a642 e577e09.exe File created C:\Windows\e5755e0 e575592.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e575592.exee577e09.exepid process 940 e575592.exe 940 e575592.exe 940 e575592.exe 940 e575592.exe 1908 e577e09.exe 1908 e577e09.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e575592.exedescription pid process Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe Token: SeDebugPrivilege 940 e575592.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee575592.exee577e09.exedescription pid process target process PID 3520 wrote to memory of 2696 3520 rundll32.exe rundll32.exe PID 3520 wrote to memory of 2696 3520 rundll32.exe rundll32.exe PID 3520 wrote to memory of 2696 3520 rundll32.exe rundll32.exe PID 2696 wrote to memory of 940 2696 rundll32.exe e575592.exe PID 2696 wrote to memory of 940 2696 rundll32.exe e575592.exe PID 2696 wrote to memory of 940 2696 rundll32.exe e575592.exe PID 940 wrote to memory of 764 940 e575592.exe fontdrvhost.exe PID 940 wrote to memory of 772 940 e575592.exe fontdrvhost.exe PID 940 wrote to memory of 1020 940 e575592.exe dwm.exe PID 940 wrote to memory of 2568 940 e575592.exe sihost.exe PID 940 wrote to memory of 2580 940 e575592.exe svchost.exe PID 940 wrote to memory of 2688 940 e575592.exe taskhostw.exe PID 940 wrote to memory of 3544 940 e575592.exe Explorer.EXE PID 940 wrote to memory of 3692 940 e575592.exe svchost.exe PID 940 wrote to memory of 3868 940 e575592.exe DllHost.exe PID 940 wrote to memory of 4024 940 e575592.exe StartMenuExperienceHost.exe PID 940 wrote to memory of 4088 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 3196 940 e575592.exe SearchApp.exe PID 940 wrote to memory of 4144 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 4600 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 3512 940 e575592.exe TextInputHost.exe PID 940 wrote to memory of 4944 940 e575592.exe backgroundTaskHost.exe PID 940 wrote to memory of 3520 940 e575592.exe rundll32.exe PID 940 wrote to memory of 2696 940 e575592.exe rundll32.exe PID 940 wrote to memory of 2696 940 e575592.exe rundll32.exe PID 2696 wrote to memory of 456 2696 rundll32.exe e57569c.exe PID 2696 wrote to memory of 456 2696 rundll32.exe e57569c.exe PID 2696 wrote to memory of 456 2696 rundll32.exe e57569c.exe PID 2696 wrote to memory of 1908 2696 rundll32.exe e577e09.exe PID 2696 wrote to memory of 1908 2696 rundll32.exe e577e09.exe PID 2696 wrote to memory of 1908 2696 rundll32.exe e577e09.exe PID 940 wrote to memory of 764 940 e575592.exe fontdrvhost.exe PID 940 wrote to memory of 772 940 e575592.exe fontdrvhost.exe PID 940 wrote to memory of 1020 940 e575592.exe dwm.exe PID 940 wrote to memory of 2568 940 e575592.exe sihost.exe PID 940 wrote to memory of 2580 940 e575592.exe svchost.exe PID 940 wrote to memory of 2688 940 e575592.exe taskhostw.exe PID 940 wrote to memory of 3544 940 e575592.exe Explorer.EXE PID 940 wrote to memory of 3692 940 e575592.exe svchost.exe PID 940 wrote to memory of 3868 940 e575592.exe DllHost.exe PID 940 wrote to memory of 4024 940 e575592.exe StartMenuExperienceHost.exe PID 940 wrote to memory of 4088 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 3196 940 e575592.exe SearchApp.exe PID 940 wrote to memory of 4144 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 4600 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 3512 940 e575592.exe TextInputHost.exe PID 940 wrote to memory of 4944 940 e575592.exe backgroundTaskHost.exe PID 940 wrote to memory of 456 940 e575592.exe e57569c.exe PID 940 wrote to memory of 456 940 e575592.exe e57569c.exe PID 940 wrote to memory of 5104 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 1052 940 e575592.exe RuntimeBroker.exe PID 940 wrote to memory of 1908 940 e575592.exe e577e09.exe PID 940 wrote to memory of 1908 940 e575592.exe e577e09.exe PID 1908 wrote to memory of 764 1908 e577e09.exe fontdrvhost.exe PID 1908 wrote to memory of 772 1908 e577e09.exe fontdrvhost.exe PID 1908 wrote to memory of 1020 1908 e577e09.exe dwm.exe PID 1908 wrote to memory of 2568 1908 e577e09.exe sihost.exe PID 1908 wrote to memory of 2580 1908 e577e09.exe svchost.exe PID 1908 wrote to memory of 2688 1908 e577e09.exe taskhostw.exe PID 1908 wrote to memory of 3544 1908 e577e09.exe Explorer.EXE PID 1908 wrote to memory of 3692 1908 e577e09.exe svchost.exe PID 1908 wrote to memory of 3868 1908 e577e09.exe DllHost.exe PID 1908 wrote to memory of 4024 1908 e577e09.exe StartMenuExperienceHost.exe PID 1908 wrote to memory of 4088 1908 e577e09.exe RuntimeBroker.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e575592.exee577e09.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e577e09.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\702879f5c9ebf4b99e8f354232b59110643c158b8a433ac392ac153bf1f6c957.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\702879f5c9ebf4b99e8f354232b59110643c158b8a433ac392ac153bf1f6c957.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e575592.exeC:\Users\Admin\AppData\Local\Temp\e575592.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e57569c.exeC:\Users\Admin\AppData\Local\Temp\e57569c.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e577e09.exeC:\Users\Admin\AppData\Local\Temp\e577e09.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e575592.exeFilesize
97KB
MD5acfd867c45493fdf3caa934e2d1fc65d
SHA1e75bfce8a154765768dfe32c1e7c190749304cd2
SHA25658385fc43fa5325e81686c7b9ff232a6bcf7e8842846bf38cdb7dcd6330f1888
SHA5128df8bed009e8707cb005293a784f0cd0aeb2b474f0e4ae3be614460c00850ea518c98dc3c3d1f2a001e7fc0fb8304fa157014b7943cc47188c21064f7fa2f7f5
-
C:\Windows\SYSTEM.INIFilesize
257B
MD547bc113843b1ec97e5532eb95bf90cad
SHA1b65b9ceb497ecee22d7729658490a6bb6a6da848
SHA256903c7bc650b0340c48721cb5f651b5b430b007a88f921168ae3f94685f9d9761
SHA51260ed0231ae1baed048a96932c47d3df9a5b56828315add845c08df2acaa46c9e83504024f4a3c1eac296650c59f9f7082786af24728857de447a33e81beb132b
-
memory/456-34-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/456-57-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/456-52-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/456-55-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/940-42-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-66-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-26-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-33-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-11-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/940-77-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-82-0x0000000001CB0000-0x0000000001CB2000-memory.dmpFilesize
8KB
-
memory/940-94-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/940-29-0x0000000001CB0000-0x0000000001CB2000-memory.dmpFilesize
8KB
-
memory/940-28-0x0000000001CB0000-0x0000000001CB2000-memory.dmpFilesize
8KB
-
memory/940-27-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-10-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-74-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-35-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-36-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-37-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-39-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-38-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-40-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-24-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-73-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-72-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-69-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-25-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-6-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-15-0x0000000001CC0000-0x0000000001CC1000-memory.dmpFilesize
4KB
-
memory/940-65-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-9-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-59-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-60-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-62-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/940-64-0x00000000008F0000-0x00000000019AA000-memory.dmpFilesize
16.7MB
-
memory/1908-114-0x0000000000B60000-0x0000000001C1A000-memory.dmpFilesize
16.7MB
-
memory/1908-56-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1908-54-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1908-50-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1908-148-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1908-147-0x0000000000B60000-0x0000000001C1A000-memory.dmpFilesize
16.7MB
-
memory/1908-58-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2696-30-0x0000000003A20000-0x0000000003A22000-memory.dmpFilesize
8KB
-
memory/2696-12-0x0000000003A20000-0x0000000003A22000-memory.dmpFilesize
8KB
-
memory/2696-0-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2696-16-0x0000000003A20000-0x0000000003A22000-memory.dmpFilesize
8KB
-
memory/2696-13-0x0000000003A30000-0x0000000003A31000-memory.dmpFilesize
4KB
-
memory/2696-47-0x0000000003A20000-0x0000000003A22000-memory.dmpFilesize
8KB