Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
e12e7baac69422bbf5fcf59e4281fce3887b962fe67dd292edcb17bf922d1844.dll
Resource
win7-20240508-en
General
-
Target
e12e7baac69422bbf5fcf59e4281fce3887b962fe67dd292edcb17bf922d1844.dll
-
Size
120KB
-
MD5
ecf84397cf3ceb257884f86650d4dc52
-
SHA1
be5d41e4f539f6e2b126e904907d94213612c02d
-
SHA256
e12e7baac69422bbf5fcf59e4281fce3887b962fe67dd292edcb17bf922d1844
-
SHA512
f100203d153eb7f32950c01c098dd0633352bcc50b9c83012cf1c5885d396b94a4b195b60ed677ffb1c783b505b701c989bb895f99fe3eba395e443bfd829c2d
-
SSDEEP
3072:3L7cxZuYAofkgvPCfv9iNsVeRXGm6XjFM:3Lefkffv9PcJGm6zF
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e574dc2.exee576987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e576987.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e576987.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e576987.exe -
Processes:
e574dc2.exee576987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576987.exe -
Processes:
e574dc2.exee576987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e576987.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 33 IoCs
Processes:
resource yara_rule behavioral2/memory/4252-8-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-6-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-11-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-29-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-12-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-13-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-10-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-34-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-30-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-36-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-37-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-38-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-39-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-40-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-41-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-43-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-44-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-52-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-54-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-56-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-65-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-67-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-70-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-73-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-74-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-77-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-76-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-79-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-80-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-81-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-88-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4252-91-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1416-136-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 37 IoCs
Processes:
resource yara_rule behavioral2/memory/4252-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4252-8-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-6-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-11-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-29-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-12-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-13-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-10-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-34-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-30-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-36-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-37-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-38-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-39-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-40-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-41-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-43-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-44-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-52-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-54-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-56-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-65-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-67-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-70-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-73-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-74-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-77-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-76-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-79-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-80-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-81-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-88-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-91-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4252-107-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3624-111-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1416-136-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/1416-135-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e574dc2.exee574edb.exee576987.exepid process 4252 e574dc2.exe 3624 e574edb.exe 1416 e576987.exe -
Processes:
resource yara_rule behavioral2/memory/4252-8-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-6-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-11-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-29-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-12-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-13-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-10-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-34-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-30-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-36-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-37-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-38-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-39-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-40-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-41-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-43-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-44-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-52-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-54-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-56-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-65-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-67-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-70-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-73-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-74-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-77-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-76-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-79-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-80-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-81-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-88-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/4252-91-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1416-136-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx -
Processes:
e574dc2.exee576987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e574dc2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e576987.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e576987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e576987.exe -
Processes:
e574dc2.exee576987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576987.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e574dc2.exedescription ioc process File opened (read-only) \??\G: e574dc2.exe File opened (read-only) \??\L: e574dc2.exe File opened (read-only) \??\M: e574dc2.exe File opened (read-only) \??\E: e574dc2.exe File opened (read-only) \??\I: e574dc2.exe File opened (read-only) \??\J: e574dc2.exe File opened (read-only) \??\Q: e574dc2.exe File opened (read-only) \??\K: e574dc2.exe File opened (read-only) \??\N: e574dc2.exe File opened (read-only) \??\P: e574dc2.exe File opened (read-only) \??\S: e574dc2.exe File opened (read-only) \??\H: e574dc2.exe File opened (read-only) \??\O: e574dc2.exe File opened (read-only) \??\R: e574dc2.exe -
Drops file in Program Files directory 4 IoCs
Processes:
e574dc2.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e574dc2.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e574dc2.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e574dc2.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e574dc2.exe -
Drops file in Windows directory 3 IoCs
Processes:
e574dc2.exee576987.exedescription ioc process File created C:\Windows\e574e01 e574dc2.exe File opened for modification C:\Windows\SYSTEM.INI e574dc2.exe File created C:\Windows\e57b7f6 e576987.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e574dc2.exepid process 4252 e574dc2.exe 4252 e574dc2.exe 4252 e574dc2.exe 4252 e574dc2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e574dc2.exedescription pid process Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe Token: SeDebugPrivilege 4252 e574dc2.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
rundll32.exerundll32.exee574dc2.exedescription pid process target process PID 4176 wrote to memory of 220 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 220 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 220 4176 rundll32.exe rundll32.exe PID 220 wrote to memory of 4252 220 rundll32.exe e574dc2.exe PID 220 wrote to memory of 4252 220 rundll32.exe e574dc2.exe PID 220 wrote to memory of 4252 220 rundll32.exe e574dc2.exe PID 4252 wrote to memory of 792 4252 e574dc2.exe fontdrvhost.exe PID 4252 wrote to memory of 796 4252 e574dc2.exe fontdrvhost.exe PID 4252 wrote to memory of 316 4252 e574dc2.exe dwm.exe PID 4252 wrote to memory of 2564 4252 e574dc2.exe sihost.exe PID 4252 wrote to memory of 2584 4252 e574dc2.exe svchost.exe PID 4252 wrote to memory of 2744 4252 e574dc2.exe taskhostw.exe PID 4252 wrote to memory of 3508 4252 e574dc2.exe Explorer.EXE PID 4252 wrote to memory of 3644 4252 e574dc2.exe svchost.exe PID 4252 wrote to memory of 3836 4252 e574dc2.exe DllHost.exe PID 4252 wrote to memory of 3928 4252 e574dc2.exe StartMenuExperienceHost.exe PID 4252 wrote to memory of 3996 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 4076 4252 e574dc2.exe SearchApp.exe PID 4252 wrote to memory of 3368 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 64 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 4116 4252 e574dc2.exe TextInputHost.exe PID 4252 wrote to memory of 4056 4252 e574dc2.exe backgroundTaskHost.exe PID 4252 wrote to memory of 4176 4252 e574dc2.exe rundll32.exe PID 4252 wrote to memory of 220 4252 e574dc2.exe rundll32.exe PID 4252 wrote to memory of 220 4252 e574dc2.exe rundll32.exe PID 220 wrote to memory of 3624 220 rundll32.exe e574edb.exe PID 220 wrote to memory of 3624 220 rundll32.exe e574edb.exe PID 220 wrote to memory of 3624 220 rundll32.exe e574edb.exe PID 220 wrote to memory of 1416 220 rundll32.exe e576987.exe PID 220 wrote to memory of 1416 220 rundll32.exe e576987.exe PID 220 wrote to memory of 1416 220 rundll32.exe e576987.exe PID 4252 wrote to memory of 792 4252 e574dc2.exe fontdrvhost.exe PID 4252 wrote to memory of 796 4252 e574dc2.exe fontdrvhost.exe PID 4252 wrote to memory of 316 4252 e574dc2.exe dwm.exe PID 4252 wrote to memory of 2564 4252 e574dc2.exe sihost.exe PID 4252 wrote to memory of 2584 4252 e574dc2.exe svchost.exe PID 4252 wrote to memory of 2744 4252 e574dc2.exe taskhostw.exe PID 4252 wrote to memory of 3508 4252 e574dc2.exe Explorer.EXE PID 4252 wrote to memory of 3644 4252 e574dc2.exe svchost.exe PID 4252 wrote to memory of 3836 4252 e574dc2.exe DllHost.exe PID 4252 wrote to memory of 3928 4252 e574dc2.exe StartMenuExperienceHost.exe PID 4252 wrote to memory of 3996 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 4076 4252 e574dc2.exe SearchApp.exe PID 4252 wrote to memory of 3368 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 64 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 4116 4252 e574dc2.exe TextInputHost.exe PID 4252 wrote to memory of 3624 4252 e574dc2.exe e574edb.exe PID 4252 wrote to memory of 3624 4252 e574dc2.exe e574edb.exe PID 4252 wrote to memory of 4216 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 2068 4252 e574dc2.exe RuntimeBroker.exe PID 4252 wrote to memory of 1416 4252 e574dc2.exe e576987.exe PID 4252 wrote to memory of 1416 4252 e574dc2.exe e576987.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e574dc2.exee576987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574dc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e576987.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e12e7baac69422bbf5fcf59e4281fce3887b962fe67dd292edcb17bf922d1844.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e12e7baac69422bbf5fcf59e4281fce3887b962fe67dd292edcb17bf922d1844.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e574dc2.exeC:\Users\Admin\AppData\Local\Temp\e574dc2.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e574edb.exeC:\Users\Admin\AppData\Local\Temp\e574edb.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e576987.exeC:\Users\Admin\AppData\Local\Temp\e576987.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e574dc2.exeFilesize
97KB
MD593c247dcb65e1f909c4298e7de67e31c
SHA10be4942dd9e70b8b555c4ef4c2330ccae68b6175
SHA2563a9e494246a3b4792e61ff35a23905c2de9a8f7d5c4087037b991a2c66a8d274
SHA512f7ae47c05e3ded36f630d5346189964aa39a0b4fac51ba911ba01eb9aab89c864413aff5e35faa25b56898c47b77e1e61edab69da9af17067ae20b796b594b85
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5f2ee66dacfc7a6c2967936919260e233
SHA13933d9d18f04f38e88b6a372680cca07cd5ba7f8
SHA256abf138b84987045dce19dae6942921d7ba6cbdb64dae7760fefb82c47f4aa2d0
SHA512f02f1d1f28452e69f5a6f30d1573d2ebc1e7dc324394be6f55f0f03505189475ce933e75d89ad801b6da187b587335cba280aa19b43416ecf860db10a0c95bbe
-
memory/220-14-0x0000000000E80000-0x0000000000E82000-memory.dmpFilesize
8KB
-
memory/220-26-0x0000000003950000-0x0000000003951000-memory.dmpFilesize
4KB
-
memory/220-18-0x0000000000E80000-0x0000000000E82000-memory.dmpFilesize
8KB
-
memory/220-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/220-27-0x0000000000E80000-0x0000000000E82000-memory.dmpFilesize
8KB
-
memory/1416-136-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/1416-64-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1416-61-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1416-135-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3624-58-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3624-59-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3624-63-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3624-33-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3624-111-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4252-43-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-17-0x0000000001C00000-0x0000000001C01000-memory.dmpFilesize
4KB
-
memory/4252-34-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-30-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-36-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-37-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-38-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-39-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-40-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-41-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-13-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-44-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-52-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-54-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-56-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-28-0x0000000001BF0000-0x0000000001BF2000-memory.dmpFilesize
8KB
-
memory/4252-32-0x0000000001BF0000-0x0000000001BF2000-memory.dmpFilesize
8KB
-
memory/4252-12-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-29-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-10-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-65-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-67-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-70-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-73-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-74-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-77-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-76-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-79-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-80-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-81-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-88-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-99-0x0000000001BF0000-0x0000000001BF2000-memory.dmpFilesize
8KB
-
memory/4252-91-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-107-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4252-11-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-6-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-8-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/4252-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB