Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
812758fba4a065bce800b5cdb70e06c9b3c41106a7e206cfd3f94e94ec0de87e.dll
Resource
win7-20240508-en
General
-
Target
812758fba4a065bce800b5cdb70e06c9b3c41106a7e206cfd3f94e94ec0de87e.dll
-
Size
120KB
-
MD5
f68983f581a6f30e7d711b2beb0511dc
-
SHA1
91621a37288c69e03fb7d1ef3eb1b7d91256a637
-
SHA256
812758fba4a065bce800b5cdb70e06c9b3c41106a7e206cfd3f94e94ec0de87e
-
SHA512
4fc2f454e19c70ddcada597d4789569b98160dfe042a353acecb5a5985a695352bfefbb7160cce04ade4a3692119b72044d52667e06a10635e2803bf4a06909f
-
SSDEEP
1536:8x2cBfTG7CVH1SWjthuY2y/HWP7cdPTn0QI0BUQ7ZRKfSfDD24r4NTo5cte:rsACVH1hht2Ta0QIUUQQOlsMm
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e57dfd1.exee5808e4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57dfd1.exe -
Processes:
e57dfd1.exee5808e4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5808e4.exe -
Processes:
e57dfd1.exee5808e4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5808e4.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 30 IoCs
Processes:
resource yara_rule behavioral2/memory/3884-8-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-9-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-6-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-19-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-29-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-10-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-21-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-18-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-34-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-37-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-36-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-33-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-38-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-40-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-39-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-42-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-60-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-61-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-63-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-65-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-67-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-68-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-70-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-72-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-74-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-75-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-76-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3884-83-0x00000000007A0000-0x000000000185A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2416-116-0x0000000000810000-0x00000000018CA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2416-161-0x0000000000810000-0x00000000018CA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 35 IoCs
Processes:
resource yara_rule behavioral2/memory/3884-8-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-9-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-6-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/2448-32-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3884-19-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-29-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-10-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-21-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-18-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-34-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-37-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-36-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-33-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-38-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-40-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-39-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-42-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-60-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-61-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-63-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-65-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-67-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-68-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-70-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-72-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-74-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-75-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-76-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-83-0x00000000007A0000-0x000000000185A000-memory.dmp UPX behavioral2/memory/3884-100-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2448-104-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2416-116-0x0000000000810000-0x00000000018CA000-memory.dmp UPX behavioral2/memory/2416-162-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2416-161-0x0000000000810000-0x00000000018CA000-memory.dmp UPX behavioral2/memory/4940-165-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
e57dfd1.exee57e0da.exee5808e4.exee580981.exepid process 3884 e57dfd1.exe 2448 e57e0da.exe 2416 e5808e4.exe 4940 e580981.exe -
Processes:
resource yara_rule behavioral2/memory/3884-8-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-9-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-6-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-19-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-29-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-10-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-21-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-18-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-34-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-37-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-36-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-33-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-38-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-40-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-39-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-42-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-60-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-61-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-63-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-65-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-67-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-68-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-70-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-72-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-74-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-75-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-76-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/3884-83-0x00000000007A0000-0x000000000185A000-memory.dmp upx behavioral2/memory/2416-116-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/2416-161-0x0000000000810000-0x00000000018CA000-memory.dmp upx -
Processes:
e57dfd1.exee5808e4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57dfd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5808e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5808e4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5808e4.exe -
Processes:
e57dfd1.exee5808e4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5808e4.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e57dfd1.exee5808e4.exedescription ioc process File opened (read-only) \??\G: e57dfd1.exe File opened (read-only) \??\I: e57dfd1.exe File opened (read-only) \??\H: e5808e4.exe File opened (read-only) \??\E: e57dfd1.exe File opened (read-only) \??\G: e5808e4.exe File opened (read-only) \??\I: e5808e4.exe File opened (read-only) \??\E: e5808e4.exe File opened (read-only) \??\J: e5808e4.exe File opened (read-only) \??\J: e57dfd1.exe File opened (read-only) \??\N: e57dfd1.exe File opened (read-only) \??\O: e57dfd1.exe File opened (read-only) \??\M: e57dfd1.exe File opened (read-only) \??\H: e57dfd1.exe File opened (read-only) \??\K: e57dfd1.exe File opened (read-only) \??\L: e57dfd1.exe -
Drops file in Program Files directory 3 IoCs
Processes:
e57dfd1.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e57dfd1.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e57dfd1.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e57dfd1.exe -
Drops file in Windows directory 3 IoCs
Processes:
e5808e4.exee57dfd1.exedescription ioc process File created C:\Windows\e58310e e5808e4.exe File created C:\Windows\e57e03e e57dfd1.exe File opened for modification C:\Windows\SYSTEM.INI e57dfd1.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e57dfd1.exee5808e4.exepid process 3884 e57dfd1.exe 3884 e57dfd1.exe 3884 e57dfd1.exe 3884 e57dfd1.exe 2416 e5808e4.exe 2416 e5808e4.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e57dfd1.exedescription pid process Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe Token: SeDebugPrivilege 3884 e57dfd1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee57dfd1.exedescription pid process target process PID 2732 wrote to memory of 4852 2732 rundll32.exe rundll32.exe PID 2732 wrote to memory of 4852 2732 rundll32.exe rundll32.exe PID 2732 wrote to memory of 4852 2732 rundll32.exe rundll32.exe PID 4852 wrote to memory of 3884 4852 rundll32.exe e57dfd1.exe PID 4852 wrote to memory of 3884 4852 rundll32.exe e57dfd1.exe PID 4852 wrote to memory of 3884 4852 rundll32.exe e57dfd1.exe PID 3884 wrote to memory of 784 3884 e57dfd1.exe fontdrvhost.exe PID 3884 wrote to memory of 792 3884 e57dfd1.exe fontdrvhost.exe PID 3884 wrote to memory of 64 3884 e57dfd1.exe dwm.exe PID 3884 wrote to memory of 2604 3884 e57dfd1.exe sihost.exe PID 3884 wrote to memory of 2664 3884 e57dfd1.exe svchost.exe PID 3884 wrote to memory of 2780 3884 e57dfd1.exe taskhostw.exe PID 3884 wrote to memory of 3476 3884 e57dfd1.exe Explorer.EXE PID 3884 wrote to memory of 3600 3884 e57dfd1.exe svchost.exe PID 3884 wrote to memory of 3800 3884 e57dfd1.exe DllHost.exe PID 3884 wrote to memory of 3892 3884 e57dfd1.exe StartMenuExperienceHost.exe PID 3884 wrote to memory of 3956 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 4044 3884 e57dfd1.exe SearchApp.exe PID 3884 wrote to memory of 3492 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 4428 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 2256 3884 e57dfd1.exe TextInputHost.exe PID 3884 wrote to memory of 4672 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 3948 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 1924 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 3088 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 2092 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 1596 3884 e57dfd1.exe backgroundTaskHost.exe PID 3884 wrote to memory of 2732 3884 e57dfd1.exe rundll32.exe PID 3884 wrote to memory of 4852 3884 e57dfd1.exe rundll32.exe PID 3884 wrote to memory of 4852 3884 e57dfd1.exe rundll32.exe PID 4852 wrote to memory of 2448 4852 rundll32.exe e57e0da.exe PID 4852 wrote to memory of 2448 4852 rundll32.exe e57e0da.exe PID 4852 wrote to memory of 2448 4852 rundll32.exe e57e0da.exe PID 3884 wrote to memory of 784 3884 e57dfd1.exe fontdrvhost.exe PID 3884 wrote to memory of 792 3884 e57dfd1.exe fontdrvhost.exe PID 3884 wrote to memory of 64 3884 e57dfd1.exe dwm.exe PID 3884 wrote to memory of 2604 3884 e57dfd1.exe sihost.exe PID 3884 wrote to memory of 2664 3884 e57dfd1.exe svchost.exe PID 3884 wrote to memory of 2780 3884 e57dfd1.exe taskhostw.exe PID 3884 wrote to memory of 3476 3884 e57dfd1.exe Explorer.EXE PID 3884 wrote to memory of 3600 3884 e57dfd1.exe svchost.exe PID 3884 wrote to memory of 3800 3884 e57dfd1.exe DllHost.exe PID 3884 wrote to memory of 3892 3884 e57dfd1.exe StartMenuExperienceHost.exe PID 3884 wrote to memory of 3956 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 4044 3884 e57dfd1.exe SearchApp.exe PID 3884 wrote to memory of 3492 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 4428 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 2256 3884 e57dfd1.exe TextInputHost.exe PID 3884 wrote to memory of 4672 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 3948 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 1924 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 3088 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 2092 3884 e57dfd1.exe msedge.exe PID 3884 wrote to memory of 1596 3884 e57dfd1.exe backgroundTaskHost.exe PID 3884 wrote to memory of 2732 3884 e57dfd1.exe rundll32.exe PID 3884 wrote to memory of 2448 3884 e57dfd1.exe e57e0da.exe PID 3884 wrote to memory of 2448 3884 e57dfd1.exe e57e0da.exe PID 3884 wrote to memory of 2892 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 3712 3884 e57dfd1.exe RuntimeBroker.exe PID 3884 wrote to memory of 4416 3884 e57dfd1.exe msedge.exe PID 4852 wrote to memory of 2416 4852 rundll32.exe e5808e4.exe PID 4852 wrote to memory of 2416 4852 rundll32.exe e5808e4.exe PID 4852 wrote to memory of 2416 4852 rundll32.exe e5808e4.exe PID 4852 wrote to memory of 4940 4852 rundll32.exe e580981.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e57dfd1.exee5808e4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5808e4.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\812758fba4a065bce800b5cdb70e06c9b3c41106a7e206cfd3f94e94ec0de87e.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\812758fba4a065bce800b5cdb70e06c9b3c41106a7e206cfd3f94e94ec0de87e.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e57dfd1.exeC:\Users\Admin\AppData\Local\Temp\e57dfd1.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e57e0da.exeC:\Users\Admin\AppData\Local\Temp\e57e0da.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e5808e4.exeC:\Users\Admin\AppData\Local\Temp\e5808e4.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e580981.exeC:\Users\Admin\AppData\Local\Temp\e580981.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffd9946ceb8,0x7ffd9946cec4,0x7ffd9946ced02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2296,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2400,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=3420 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4604,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=1300 /prefetch:82⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e57dfd1.exeFilesize
97KB
MD58ee6703590006427c3f796a027c4095c
SHA137c19b27659a5b6ff318c02974ab96e23db7e725
SHA2566363f8ce2b7fecfd4f64dd1145234a27dc165d74b13b9a15cb3cd452e0a182ec
SHA51249338191d2907f501c5cf80e8ba9f2a0fd9dc9b6d6d133181abc068e50db0c1e350ab09ce0a495c14bd6f9f24c9f76f8a2dd500292dcf9033ff053466f5d916e
-
C:\Windows\SYSTEM.INIFilesize
257B
MD592db20267f1f6c38e6196a4e195338e3
SHA1c5ceaf6f3d7d80ffa341ab7c0c58d756dbf6c863
SHA2565e76b3359a3e4186422aef716219d0a9e73d7247dc6bd8e6b0a63356f55a3f89
SHA512c451a69fa603119608d52b71afdb538f5a7c728dd30d321eee228b7af0bbc56439f50766ecb09eba6db40a9f509c3fb1437da4cb8d8d7f0287baa95177913e7b
-
memory/2416-161-0x0000000000810000-0x00000000018CA000-memory.dmpFilesize
16.7MB
-
memory/2416-162-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2416-116-0x0000000000810000-0x00000000018CA000-memory.dmpFilesize
16.7MB
-
memory/2416-52-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2448-45-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2448-104-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2448-51-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2448-32-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2448-46-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3884-39-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-75-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-22-0x0000000000560000-0x0000000000562000-memory.dmpFilesize
8KB
-
memory/3884-21-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-18-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-20-0x0000000000560000-0x0000000000562000-memory.dmpFilesize
8KB
-
memory/3884-4-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3884-8-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-34-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-37-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-36-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-33-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-38-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-40-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-9-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-42-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-29-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-19-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-14-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/3884-6-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-100-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3884-90-0x0000000000560000-0x0000000000562000-memory.dmpFilesize
8KB
-
memory/3884-60-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-61-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-63-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-65-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-67-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-68-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-70-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-72-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-74-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-10-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-76-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/3884-83-0x00000000007A0000-0x000000000185A000-memory.dmpFilesize
16.7MB
-
memory/4852-54-0x0000000000A30000-0x0000000000A32000-memory.dmpFilesize
8KB
-
memory/4852-15-0x0000000000A30000-0x0000000000A32000-memory.dmpFilesize
8KB
-
memory/4852-23-0x0000000000A30000-0x0000000000A32000-memory.dmpFilesize
8KB
-
memory/4852-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/4852-11-0x0000000000A30000-0x0000000000A32000-memory.dmpFilesize
8KB
-
memory/4852-12-0x0000000000A40000-0x0000000000A41000-memory.dmpFilesize
4KB
-
memory/4940-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4940-165-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB