Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
7ec48a1ae85d74b18a15e46146e67f874ac5a4e13c82c72200ed337fdaab2e9b.dll
Resource
win7-20240508-en
General
-
Target
7ec48a1ae85d74b18a15e46146e67f874ac5a4e13c82c72200ed337fdaab2e9b.dll
-
Size
120KB
-
MD5
0a00bfbc8f8ef791662b3e122389c7c3
-
SHA1
20f71f62a2d52b57dcd6164d01a8c0aee0c1f248
-
SHA256
7ec48a1ae85d74b18a15e46146e67f874ac5a4e13c82c72200ed337fdaab2e9b
-
SHA512
5a8e02e4557fc553b2da8b712056d48e42d9556620408330bf171f6c9c6bb0a2a5b47239d3562f81147978bcbfb26ce581b92dff09f26aea0567f3711a182e0f
-
SSDEEP
1536:6JJFdFDs/Y/GFzMN6+HyaHI3uxD9XD/OMWOUMIcGcmHvQKwnLlD6BLIREIIxYJmo:6nFDsAMMUSI3lEIcpPzxD0EYuslZvc
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f7615b2.exef76316c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76316c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76316c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76316c.exe -
Processes:
f7615b2.exef76316c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76316c.exe -
Processes:
f76316c.exef7615b2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7615b2.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 24 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-12-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-14-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-15-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-38-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-18-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-39-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-37-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-16-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-40-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-17-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-63-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-62-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-64-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-65-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-66-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-68-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-69-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-83-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-85-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-87-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-122-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2468-157-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1360-176-0x00000000009C0000-0x0000000001A7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1360-212-0x00000000009C0000-0x0000000001A7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 28 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-12-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-61-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2468-14-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-15-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-38-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-18-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-39-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-37-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-16-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-40-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-17-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-63-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-62-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-64-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-65-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-66-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-68-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-69-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-83-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-85-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-87-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-122-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-157-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2468-158-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2768-162-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/1360-176-0x00000000009C0000-0x0000000001A7A000-memory.dmp UPX behavioral1/memory/1360-212-0x00000000009C0000-0x0000000001A7A000-memory.dmp UPX behavioral1/memory/1360-213-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
f7615b2.exef7616fa.exef76316c.exepid process 2468 f7615b2.exe 2768 f7616fa.exe 1360 f76316c.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2468-12-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-14-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-15-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-38-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-18-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-39-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-37-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-16-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-40-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-17-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-63-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-62-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-64-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-65-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-66-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-68-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-69-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-83-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-85-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-87-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-122-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2468-157-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1360-176-0x00000000009C0000-0x0000000001A7A000-memory.dmp upx behavioral1/memory/1360-212-0x00000000009C0000-0x0000000001A7A000-memory.dmp upx -
Processes:
f7615b2.exef76316c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7615b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76316c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76316c.exe -
Processes:
f7615b2.exef76316c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7615b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76316c.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f7615b2.exef76316c.exedescription ioc process File opened (read-only) \??\E: f7615b2.exe File opened (read-only) \??\P: f7615b2.exe File opened (read-only) \??\I: f7615b2.exe File opened (read-only) \??\N: f7615b2.exe File opened (read-only) \??\O: f7615b2.exe File opened (read-only) \??\Q: f7615b2.exe File opened (read-only) \??\T: f7615b2.exe File opened (read-only) \??\J: f7615b2.exe File opened (read-only) \??\K: f7615b2.exe File opened (read-only) \??\L: f7615b2.exe File opened (read-only) \??\M: f7615b2.exe File opened (read-only) \??\G: f7615b2.exe File opened (read-only) \??\H: f7615b2.exe File opened (read-only) \??\R: f7615b2.exe File opened (read-only) \??\S: f7615b2.exe File opened (read-only) \??\E: f76316c.exe File opened (read-only) \??\G: f76316c.exe -
Drops file in Windows directory 3 IoCs
Processes:
f7615b2.exef76316c.exedescription ioc process File created C:\Windows\f761610 f7615b2.exe File opened for modification C:\Windows\SYSTEM.INI f7615b2.exe File created C:\Windows\f7665c5 f76316c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f7615b2.exef76316c.exepid process 2468 f7615b2.exe 2468 f7615b2.exe 1360 f76316c.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
f7615b2.exef76316c.exedescription pid process Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 2468 f7615b2.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe Token: SeDebugPrivilege 1360 f76316c.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef7615b2.exef76316c.exedescription pid process target process PID 2108 wrote to memory of 2096 2108 rundll32.exe rundll32.exe PID 2108 wrote to memory of 2096 2108 rundll32.exe rundll32.exe PID 2108 wrote to memory of 2096 2108 rundll32.exe rundll32.exe PID 2108 wrote to memory of 2096 2108 rundll32.exe rundll32.exe PID 2108 wrote to memory of 2096 2108 rundll32.exe rundll32.exe PID 2108 wrote to memory of 2096 2108 rundll32.exe rundll32.exe PID 2108 wrote to memory of 2096 2108 rundll32.exe rundll32.exe PID 2096 wrote to memory of 2468 2096 rundll32.exe f7615b2.exe PID 2096 wrote to memory of 2468 2096 rundll32.exe f7615b2.exe PID 2096 wrote to memory of 2468 2096 rundll32.exe f7615b2.exe PID 2096 wrote to memory of 2468 2096 rundll32.exe f7615b2.exe PID 2468 wrote to memory of 1112 2468 f7615b2.exe taskhost.exe PID 2468 wrote to memory of 1164 2468 f7615b2.exe Dwm.exe PID 2468 wrote to memory of 1188 2468 f7615b2.exe Explorer.EXE PID 2468 wrote to memory of 1936 2468 f7615b2.exe DllHost.exe PID 2468 wrote to memory of 2108 2468 f7615b2.exe rundll32.exe PID 2468 wrote to memory of 2096 2468 f7615b2.exe rundll32.exe PID 2468 wrote to memory of 2096 2468 f7615b2.exe rundll32.exe PID 2096 wrote to memory of 2768 2096 rundll32.exe f7616fa.exe PID 2096 wrote to memory of 2768 2096 rundll32.exe f7616fa.exe PID 2096 wrote to memory of 2768 2096 rundll32.exe f7616fa.exe PID 2096 wrote to memory of 2768 2096 rundll32.exe f7616fa.exe PID 2096 wrote to memory of 1360 2096 rundll32.exe f76316c.exe PID 2096 wrote to memory of 1360 2096 rundll32.exe f76316c.exe PID 2096 wrote to memory of 1360 2096 rundll32.exe f76316c.exe PID 2096 wrote to memory of 1360 2096 rundll32.exe f76316c.exe PID 2468 wrote to memory of 1112 2468 f7615b2.exe taskhost.exe PID 2468 wrote to memory of 1164 2468 f7615b2.exe Dwm.exe PID 2468 wrote to memory of 1188 2468 f7615b2.exe Explorer.EXE PID 2468 wrote to memory of 2768 2468 f7615b2.exe f7616fa.exe PID 2468 wrote to memory of 2768 2468 f7615b2.exe f7616fa.exe PID 2468 wrote to memory of 1360 2468 f7615b2.exe f76316c.exe PID 2468 wrote to memory of 1360 2468 f7615b2.exe f76316c.exe PID 1360 wrote to memory of 1112 1360 f76316c.exe taskhost.exe PID 1360 wrote to memory of 1164 1360 f76316c.exe Dwm.exe PID 1360 wrote to memory of 1188 1360 f76316c.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f76316c.exef7615b2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76316c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7615b2.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ec48a1ae85d74b18a15e46146e67f874ac5a4e13c82c72200ed337fdaab2e9b.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ec48a1ae85d74b18a15e46146e67f874ac5a4e13c82c72200ed337fdaab2e9b.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f7615b2.exeC:\Users\Admin\AppData\Local\Temp\f7615b2.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f7616fa.exeC:\Users\Admin\AppData\Local\Temp\f7616fa.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f76316c.exeC:\Users\Admin\AppData\Local\Temp\f76316c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f7615b2.exeFilesize
97KB
MD54cf7cd937470d6738c97084a6897df6a
SHA1304457526061576f997213cbaece2d6fd49f42fd
SHA2560b0e39360b9febcfe574f5cbf2ea61bd8d53dc1b5dbddd38ba78b60c3712429e
SHA512eed6a2b0b887c6b2d8f15a2c202448144ce8330264f2bb1f8294b0c96b1c22c458dc076ff9dc715e7e6545d6d05532b33203224792b76445865a74715ea7270a
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5641ff4d89768f2da769c02318c2c7882
SHA1e12b689f25d741834b6805c59c9a9c569033a79d
SHA256628c12fb4764ce3b59fe3b855fb1adb93cb90743c1fd45020486c0c7a26d7e7f
SHA5120b8ec97b9feb981680476b347e9fed18aaa8bd24c99eee6e1326448b8c6c41c0a265dadfd121e094510800ebc74dd009d153502a380a839a5d594ed5c125507f
-
memory/1112-19-0x00000000003A0000-0x00000000003A2000-memory.dmpFilesize
8KB
-
memory/1360-104-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1360-213-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1360-82-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1360-212-0x00000000009C0000-0x0000000001A7A000-memory.dmpFilesize
16.7MB
-
memory/1360-176-0x00000000009C0000-0x0000000001A7A000-memory.dmpFilesize
16.7MB
-
memory/1360-107-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/1360-105-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2096-58-0x0000000000220000-0x0000000000232000-memory.dmpFilesize
72KB
-
memory/2096-27-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2096-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2096-41-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2096-59-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2096-28-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2096-78-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2096-81-0x0000000000170000-0x0000000000172000-memory.dmpFilesize
8KB
-
memory/2096-9-0x0000000000170000-0x0000000000182000-memory.dmpFilesize
72KB
-
memory/2096-51-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2096-10-0x0000000000170000-0x0000000000182000-memory.dmpFilesize
72KB
-
memory/2468-42-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/2468-87-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-16-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-17-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-37-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-63-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-62-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-64-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-65-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-66-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-68-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-69-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-39-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-18-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-38-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-83-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-85-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-40-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-15-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-14-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2468-12-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-60-0x0000000000320000-0x0000000000322000-memory.dmpFilesize
8KB
-
memory/2468-52-0x0000000000320000-0x0000000000322000-memory.dmpFilesize
8KB
-
memory/2468-122-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-138-0x0000000000320000-0x0000000000322000-memory.dmpFilesize
8KB
-
memory/2468-157-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2468-158-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2768-162-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2768-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2768-98-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2768-106-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2768-99-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB