Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
982d4b0f323c39c9b46cf1fa7c444da7815428257e5619490cb8c37a76b1c8f2.dll
Resource
win7-20240508-en
General
-
Target
982d4b0f323c39c9b46cf1fa7c444da7815428257e5619490cb8c37a76b1c8f2.dll
-
Size
120KB
-
MD5
0c60e7a4b91cef14ab81d6afce534b6d
-
SHA1
e3c7138ccee52bff03ecb0693faf76e6b85ff5ba
-
SHA256
982d4b0f323c39c9b46cf1fa7c444da7815428257e5619490cb8c37a76b1c8f2
-
SHA512
f50e3b82a020b10d340c97badec56cb6179c10e1694c805f84391060e28fa261034acac56bbd5015c0d9afcd08cbb9a2d8768e3f19184105b7bb36aae97bcf5d
-
SSDEEP
3072:j4BGPzcJ7miopYmzQC87x17ReBYnhmn1eatIsJ:DPzcAisYmcCoxCY6oarJ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e57421a.exee57689d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57421a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57421a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57689d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57689d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57689d.exe -
Processes:
e57421a.exee57689d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57689d.exe -
Processes:
e57421a.exee57689d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57689d.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 28 IoCs
Processes:
resource yara_rule behavioral2/memory/2532-6-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-20-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-11-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-28-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-29-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-19-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-18-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-12-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-8-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-10-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-9-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-36-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-37-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-38-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-39-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-40-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-58-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-59-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-60-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-62-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-63-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-65-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-66-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-69-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-71-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2532-74-0x00000000008A0000-0x000000000195A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1900-98-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1048-109-0x0000000000B50000-0x0000000001C0A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 34 IoCs
Processes:
resource yara_rule behavioral2/memory/2532-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2532-6-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-20-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-11-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-28-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-29-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/1900-35-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2532-19-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-18-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-12-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-8-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-10-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-9-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-36-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-37-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-38-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-39-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-40-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/1048-48-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2532-58-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-59-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-60-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-62-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-63-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-65-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-66-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-69-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-71-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-74-0x00000000008A0000-0x000000000195A000-memory.dmp UPX behavioral2/memory/2532-92-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1900-97-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1900-98-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/1048-109-0x0000000000B50000-0x0000000001C0A000-memory.dmp UPX behavioral2/memory/1048-111-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e57421a.exee5743c0.exee57689d.exepid process 2532 e57421a.exe 1900 e5743c0.exe 1048 e57689d.exe -
Processes:
resource yara_rule behavioral2/memory/2532-6-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-20-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-11-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-28-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-29-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-19-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-18-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-12-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-8-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-10-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-9-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-36-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-37-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-38-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-39-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-40-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-58-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-59-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-60-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-62-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-63-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-65-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-66-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-69-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-71-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/2532-74-0x00000000008A0000-0x000000000195A000-memory.dmp upx behavioral2/memory/1900-98-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx behavioral2/memory/1048-109-0x0000000000B50000-0x0000000001C0A000-memory.dmp upx -
Processes:
e57421a.exee57689d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57421a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57689d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57689d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57689d.exe -
Processes:
e57421a.exee57689d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57689d.exe -
Enumerates connected drives 3 TTPs 9 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e57421a.exedescription ioc process File opened (read-only) \??\M: e57421a.exe File opened (read-only) \??\H: e57421a.exe File opened (read-only) \??\L: e57421a.exe File opened (read-only) \??\I: e57421a.exe File opened (read-only) \??\J: e57421a.exe File opened (read-only) \??\K: e57421a.exe File opened (read-only) \??\N: e57421a.exe File opened (read-only) \??\E: e57421a.exe File opened (read-only) \??\G: e57421a.exe -
Drops file in Windows directory 3 IoCs
Processes:
e57421a.exee57689d.exedescription ioc process File created C:\Windows\e574277 e57421a.exe File opened for modification C:\Windows\SYSTEM.INI e57421a.exe File created C:\Windows\e57b70b e57689d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e57421a.exepid process 2532 e57421a.exe 2532 e57421a.exe 2532 e57421a.exe 2532 e57421a.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e57421a.exedescription pid process Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe Token: SeDebugPrivilege 2532 e57421a.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
rundll32.exerundll32.exee57421a.exedescription pid process target process PID 3656 wrote to memory of 3648 3656 rundll32.exe rundll32.exe PID 3656 wrote to memory of 3648 3656 rundll32.exe rundll32.exe PID 3656 wrote to memory of 3648 3656 rundll32.exe rundll32.exe PID 3648 wrote to memory of 2532 3648 rundll32.exe e57421a.exe PID 3648 wrote to memory of 2532 3648 rundll32.exe e57421a.exe PID 3648 wrote to memory of 2532 3648 rundll32.exe e57421a.exe PID 2532 wrote to memory of 788 2532 e57421a.exe fontdrvhost.exe PID 2532 wrote to memory of 796 2532 e57421a.exe fontdrvhost.exe PID 2532 wrote to memory of 316 2532 e57421a.exe dwm.exe PID 2532 wrote to memory of 2392 2532 e57421a.exe sihost.exe PID 2532 wrote to memory of 2432 2532 e57421a.exe svchost.exe PID 2532 wrote to memory of 2548 2532 e57421a.exe taskhostw.exe PID 2532 wrote to memory of 3540 2532 e57421a.exe Explorer.EXE PID 2532 wrote to memory of 3676 2532 e57421a.exe svchost.exe PID 2532 wrote to memory of 3880 2532 e57421a.exe DllHost.exe PID 2532 wrote to memory of 3976 2532 e57421a.exe StartMenuExperienceHost.exe PID 2532 wrote to memory of 4040 2532 e57421a.exe RuntimeBroker.exe PID 2532 wrote to memory of 396 2532 e57421a.exe SearchApp.exe PID 2532 wrote to memory of 3720 2532 e57421a.exe RuntimeBroker.exe PID 2532 wrote to memory of 4212 2532 e57421a.exe RuntimeBroker.exe PID 2532 wrote to memory of 4492 2532 e57421a.exe TextInputHost.exe PID 2532 wrote to memory of 3656 2532 e57421a.exe rundll32.exe PID 2532 wrote to memory of 3648 2532 e57421a.exe rundll32.exe PID 2532 wrote to memory of 3648 2532 e57421a.exe rundll32.exe PID 3648 wrote to memory of 1900 3648 rundll32.exe e5743c0.exe PID 3648 wrote to memory of 1900 3648 rundll32.exe e5743c0.exe PID 3648 wrote to memory of 1900 3648 rundll32.exe e5743c0.exe PID 3648 wrote to memory of 1048 3648 rundll32.exe e57689d.exe PID 3648 wrote to memory of 1048 3648 rundll32.exe e57689d.exe PID 3648 wrote to memory of 1048 3648 rundll32.exe e57689d.exe PID 2532 wrote to memory of 788 2532 e57421a.exe fontdrvhost.exe PID 2532 wrote to memory of 796 2532 e57421a.exe fontdrvhost.exe PID 2532 wrote to memory of 316 2532 e57421a.exe dwm.exe PID 2532 wrote to memory of 2392 2532 e57421a.exe sihost.exe PID 2532 wrote to memory of 2432 2532 e57421a.exe svchost.exe PID 2532 wrote to memory of 2548 2532 e57421a.exe taskhostw.exe PID 2532 wrote to memory of 3540 2532 e57421a.exe Explorer.EXE PID 2532 wrote to memory of 3676 2532 e57421a.exe svchost.exe PID 2532 wrote to memory of 3880 2532 e57421a.exe DllHost.exe PID 2532 wrote to memory of 3976 2532 e57421a.exe StartMenuExperienceHost.exe PID 2532 wrote to memory of 4040 2532 e57421a.exe RuntimeBroker.exe PID 2532 wrote to memory of 396 2532 e57421a.exe SearchApp.exe PID 2532 wrote to memory of 3720 2532 e57421a.exe RuntimeBroker.exe PID 2532 wrote to memory of 4212 2532 e57421a.exe RuntimeBroker.exe PID 2532 wrote to memory of 4492 2532 e57421a.exe TextInputHost.exe PID 2532 wrote to memory of 1900 2532 e57421a.exe e5743c0.exe PID 2532 wrote to memory of 1900 2532 e57421a.exe e5743c0.exe PID 2532 wrote to memory of 1048 2532 e57421a.exe e57689d.exe PID 2532 wrote to memory of 1048 2532 e57421a.exe e57689d.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e57421a.exee57689d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57421a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57689d.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\982d4b0f323c39c9b46cf1fa7c444da7815428257e5619490cb8c37a76b1c8f2.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\982d4b0f323c39c9b46cf1fa7c444da7815428257e5619490cb8c37a76b1c8f2.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e57421a.exeC:\Users\Admin\AppData\Local\Temp\e57421a.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e5743c0.exeC:\Users\Admin\AppData\Local\Temp\e5743c0.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e57689d.exeC:\Users\Admin\AppData\Local\Temp\e57689d.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e57421a.exeFilesize
97KB
MD5b0d1c41f3dcefe5bc7050aaced2e01d4
SHA1486e63b0ffd8bae1a2ad8af9ce3211b937428f58
SHA2568eaeb4e01ad4bf5b94d02f483a479f786e340bb93ee12b97a691112c38e417b0
SHA51208a25f30fb55d627b28f15d206b7d6f2aeee71e9dc1af09dbb8a6fd314c5ec2fe7dcb116f0d894cf69eb17e0a83f439abe2a8d696d645fcea3f1271aefc355a4
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5e3fa82f6c65f8e66a6dd4318569f7c16
SHA1788f23325cfee69528795b5bafa6aa65bc9b7ec9
SHA2567d41a977a2e01f4916a5eb6e9c6ccadca941ddae725ef8550e188165ceeefa44
SHA51206f054dae6f2234cb391d59fb41b2053e9fbe78f56b61152ee5bc8d43d3acf07fff198d1de45bb3fdec719ecbfbfa86c540ea52437bd6489ffa2837c31479aaf
-
memory/1048-53-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1048-57-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1048-111-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1048-109-0x0000000000B50000-0x0000000001C0A000-memory.dmpFilesize
16.7MB
-
memory/1048-48-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1048-55-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1900-98-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/1900-35-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1900-51-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1900-54-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1900-97-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1900-56-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1900-112-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/2532-39-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-79-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/2532-24-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/2532-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2532-6-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-10-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-9-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-36-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-37-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-38-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-20-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-40-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-8-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-12-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-18-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-11-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-32-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/2532-19-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-29-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-58-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-59-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-60-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-62-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-63-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-65-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-66-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-69-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-71-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-30-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/2532-74-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/2532-92-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2532-28-0x00000000008A0000-0x000000000195A000-memory.dmpFilesize
16.7MB
-
memory/3648-25-0x0000000004770000-0x0000000004772000-memory.dmpFilesize
8KB
-
memory/3648-31-0x0000000004770000-0x0000000004772000-memory.dmpFilesize
8KB
-
memory/3648-2-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3648-21-0x0000000004770000-0x0000000004772000-memory.dmpFilesize
8KB
-
memory/3648-22-0x0000000004800000-0x0000000004801000-memory.dmpFilesize
4KB