Analysis
-
max time kernel
26s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe
Resource
win7-20240220-en
General
-
Target
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe
-
Size
287KB
-
MD5
763214b9365b3514da15e89e5aa36cad
-
SHA1
0c427a0142f62951fd2c818ec754f2b0b82179a2
-
SHA256
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957
-
SHA512
c32e1e70bef83862cd5e4ad307cfbf8064a6edcd839355b93c64c109b9826ba4a69d20aaf1d1819ac35d80744d9fa3bfbbc66675497a836fd5c60656878bf0a5
-
SSDEEP
6144:TvEa2U+T6i5LirrllHy4HUcMQY6J27Ox0+MeyI:TEaN+T5xYrllrU7QY6A7ObMC
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
explorer.exef7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" explorer.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2916-1-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-6-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-7-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-4-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-10-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-8-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-11-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-9-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-12-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-28-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-27-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-34-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-74-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2916-78-0x0000000002680000-0x000000000370E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2676-104-0x00000000033B0000-0x000000000443E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2676-107-0x00000000033B0000-0x000000000443E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2676-108-0x00000000033B0000-0x000000000443E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2676-127-0x00000000033B0000-0x000000000443E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2676-106-0x00000000033B0000-0x000000000443E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2676-129-0x00000000033B0000-0x000000000443E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine C:\hfyji.pif INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 25 IoCs
Processes:
resource yara_rule behavioral1/memory/2916-1-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-6-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-7-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-4-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-10-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-8-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-11-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-9-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-12-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-28-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-27-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2676-41-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/2916-34-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-74-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2916-78-0x0000000002680000-0x000000000370E000-memory.dmp UPX behavioral1/memory/2572-84-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/2572-81-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/2368-87-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/2916-102-0x0000000000400000-0x0000000000441000-memory.dmp UPX behavioral1/memory/2676-104-0x00000000033B0000-0x000000000443E000-memory.dmp UPX behavioral1/memory/2676-107-0x00000000033B0000-0x000000000443E000-memory.dmp UPX behavioral1/memory/2676-108-0x00000000033B0000-0x000000000443E000-memory.dmp UPX behavioral1/memory/2676-127-0x00000000033B0000-0x000000000443E000-memory.dmp UPX behavioral1/memory/2676-106-0x00000000033B0000-0x000000000443E000-memory.dmp UPX behavioral1/memory/2676-129-0x00000000033B0000-0x000000000443E000-memory.dmp UPX -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 2676 explorer.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 2676 explorer.exe 2368 spoolsv.exe 2288 svchost.exe 2572 spoolsv.exe -
Loads dropped DLL 8 IoCs
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exespoolsv.exesvchost.exepid process 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe 2676 explorer.exe 2676 explorer.exe 2368 spoolsv.exe 2368 spoolsv.exe 2288 svchost.exe 2288 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/2916-1-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-6-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-7-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-4-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-10-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-8-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-11-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-9-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-12-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-28-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-27-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-34-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-74-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2916-78-0x0000000002680000-0x000000000370E000-memory.dmp upx behavioral1/memory/2676-104-0x00000000033B0000-0x000000000443E000-memory.dmp upx behavioral1/memory/2676-107-0x00000000033B0000-0x000000000443E000-memory.dmp upx behavioral1/memory/2676-108-0x00000000033B0000-0x000000000443E000-memory.dmp upx behavioral1/memory/2676-127-0x00000000033B0000-0x000000000443E000-memory.dmp upx behavioral1/memory/2676-106-0x00000000033B0000-0x000000000443E000-memory.dmp upx behavioral1/memory/2676-129-0x00000000033B0000-0x000000000443E000-memory.dmp upx -
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\K: explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
explorer.exesvchost.exef7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\SYSTEM.INI f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe File opened for modification \??\c:\windows\system\explorer.exe f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exesvchost.exepid process 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2288 svchost.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2288 svchost.exe 2676 explorer.exe 2676 explorer.exe 2288 svchost.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2676 explorer.exe 2288 svchost.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2288 svchost.exe 2676 explorer.exe 2676 explorer.exe 2288 svchost.exe 2676 explorer.exe 2288 svchost.exe 2288 svchost.exe 2676 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2676 explorer.exe 2288 svchost.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe 2676 explorer.exe 2676 explorer.exe 2368 spoolsv.exe 2368 spoolsv.exe 2288 svchost.exe 2288 svchost.exe 2572 spoolsv.exe 2572 spoolsv.exe 2676 explorer.exe 2676 explorer.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2916 wrote to memory of 1072 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe taskhost.exe PID 2916 wrote to memory of 1128 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Dwm.exe PID 2916 wrote to memory of 1152 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Explorer.EXE PID 2916 wrote to memory of 1712 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe DllHost.exe PID 2916 wrote to memory of 2676 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe explorer.exe PID 2916 wrote to memory of 2676 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe explorer.exe PID 2916 wrote to memory of 2676 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe explorer.exe PID 2916 wrote to memory of 2676 2916 f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe explorer.exe PID 2676 wrote to memory of 2368 2676 explorer.exe spoolsv.exe PID 2676 wrote to memory of 2368 2676 explorer.exe spoolsv.exe PID 2676 wrote to memory of 2368 2676 explorer.exe spoolsv.exe PID 2676 wrote to memory of 2368 2676 explorer.exe spoolsv.exe PID 2368 wrote to memory of 2288 2368 spoolsv.exe svchost.exe PID 2368 wrote to memory of 2288 2368 spoolsv.exe svchost.exe PID 2368 wrote to memory of 2288 2368 spoolsv.exe svchost.exe PID 2368 wrote to memory of 2288 2368 spoolsv.exe svchost.exe PID 2288 wrote to memory of 2572 2288 svchost.exe spoolsv.exe PID 2288 wrote to memory of 2572 2288 svchost.exe spoolsv.exe PID 2288 wrote to memory of 2572 2288 svchost.exe spoolsv.exe PID 2288 wrote to memory of 2572 2288 svchost.exe spoolsv.exe PID 2288 wrote to memory of 288 2288 svchost.exe at.exe PID 2288 wrote to memory of 288 2288 svchost.exe at.exe PID 2288 wrote to memory of 288 2288 svchost.exe at.exe PID 2288 wrote to memory of 288 2288 svchost.exe at.exe PID 2676 wrote to memory of 1072 2676 explorer.exe taskhost.exe PID 2676 wrote to memory of 1128 2676 explorer.exe Dwm.exe PID 2676 wrote to memory of 1152 2676 explorer.exe Explorer.EXE PID 2676 wrote to memory of 2288 2676 explorer.exe svchost.exe PID 2676 wrote to memory of 2288 2676 explorer.exe svchost.exe PID 2676 wrote to memory of 1072 2676 explorer.exe taskhost.exe PID 2676 wrote to memory of 1128 2676 explorer.exe Dwm.exe PID 2676 wrote to memory of 1152 2676 explorer.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe"C:\Users\Admin\AppData\Local\Temp\f7acdc93b42f5033678311972af00b0674db783e5a88d7c5d59617c41eb97957.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Modifies Installed Components in the registry
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\at.exeat 19:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
9Hide Artifacts
1Hidden Files and Directories
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\mrsys.exeFilesize
287KB
MD53f5e9e1d134bdd1c640cb6cf67675dcf
SHA11a2bb871f04a5deffe69580d96abaf055efbc928
SHA256e94df1d34cd4e051992931c90da077cf514cdfa311441c5aafc2c06705595724
SHA512df649d1c00505d1dbfbba381d4b8e5406752eefe0bd7db1f358caa1b563d33470da5e3d69f2fe4fce36ed34537570c0b574e7d56bd0924733a751fc408a032a1
-
C:\Windows\SYSTEM.INIFilesize
257B
MD515dff41f3ca4be6835a2e520348dc73d
SHA1555b2d92ae13946f0416d8d064d5d6ffa63eb105
SHA2568d6dd2f0bf34e1ca623fc7d4b0476809587833105aec362acb059e888f1a0afd
SHA51253c6ae79a1b7a6af5d96dc23f1ba23aa009c22b1ef8d0a639ef4637450b1790a22cc509b5af59ffedeecf4accf487ee32c57394ad481c11eaa56af470328453a
-
C:\Windows\system\svchost.exeFilesize
287KB
MD50298d3c8e24ba4f117a139a8106e268d
SHA12738cb01df3d30cdd3e14ba17e2492986667398a
SHA256ba2a1ae76d3c9511458811902d09e74cc4fa7a13af5ff3b47e88f4a44b5eae3b
SHA5122263cc0050642e60f0485a799cf52af9210f6b56ac9769b6d512bb0ae5a215f9554a7e9a51aabaf6f145345c71438e17ef5b5f4bdeaf7f7c4dd046f77ccfdec3
-
C:\hfyji.pifFilesize
100KB
MD5cc3c654c48cd6400c85b99dedea71a4c
SHA1e373bcb6ae064517da8b41fae03e38c6fc9e3536
SHA2569cf9493edad5606f7e6fb274f2f82e6c7e3f1ce5acf6ecb90a9bc9b6bc7d6c5d
SHA512c43dd3d8a2ab6dd926768fe995540afe25094da12550905a453f5fe3736688fa6c213c1a891e3e707d6e5a7dadf9e64bdf299aebba9362933b188397328cac36
-
\Windows\system\explorer.exeFilesize
288KB
MD53c0247cac506cb11d03cb4912ba16d70
SHA1a49f87cf189c3a3bcac30b3443a7abe14a0bd691
SHA256b9b507a6597f26ba87c872254de9cfa316f494d2acdc81a6260bf0b1e3bd2ee8
SHA51225339dcf1ee18d2366309331f4ba3c68fb7a9d6b7c0ad0c8bd4e82f29033a473cf683d793a348579a5473601efa27e2447f66464da0ce7037261c9f40f23207c
-
\Windows\system\spoolsv.exeFilesize
287KB
MD597cbe5b711a1e4ba9bfe7f3f56b2a1de
SHA1880f3afb6ae7247ff763b09ff662044bf2d5ab07
SHA256d785d954c54cc0ab3ee1179bdc71fa2fdc5d1809ab33212e88765fdb1d57657d
SHA5120a8072587cd54be98bc65417bd475e118957877adab170d9f5a10e0120db08c6ca0ff47236c20d2fa06dd1a863dbe673ce3b5f1a8c3fd581f12318da1b880aac
-
memory/1072-13-0x0000000002010000-0x0000000002012000-memory.dmpFilesize
8KB
-
memory/2288-126-0x0000000002520000-0x0000000002521000-memory.dmpFilesize
4KB
-
memory/2368-57-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2368-87-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2572-84-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2572-81-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2676-104-0x00000000033B0000-0x000000000443E000-memory.dmpFilesize
16.6MB
-
memory/2676-107-0x00000000033B0000-0x000000000443E000-memory.dmpFilesize
16.6MB
-
memory/2676-120-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/2676-108-0x00000000033B0000-0x000000000443E000-memory.dmpFilesize
16.6MB
-
memory/2676-50-0x00000000033B0000-0x00000000033F1000-memory.dmpFilesize
260KB
-
memory/2676-127-0x00000000033B0000-0x000000000443E000-memory.dmpFilesize
16.6MB
-
memory/2676-106-0x00000000033B0000-0x000000000443E000-memory.dmpFilesize
16.6MB
-
memory/2676-56-0x00000000033B0000-0x00000000033F1000-memory.dmpFilesize
260KB
-
memory/2676-129-0x00000000033B0000-0x000000000443E000-memory.dmpFilesize
16.6MB
-
memory/2676-41-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2916-20-0x0000000000700000-0x0000000000702000-memory.dmpFilesize
8KB
-
memory/2916-102-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2916-39-0x0000000005750000-0x0000000005791000-memory.dmpFilesize
260KB
-
memory/2916-27-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-33-0x0000000005610000-0x0000000005651000-memory.dmpFilesize
260KB
-
memory/2916-28-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-74-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-78-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-12-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-9-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-11-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-34-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2916-21-0x00000000007D0000-0x00000000007D1000-memory.dmpFilesize
4KB
-
memory/2916-23-0x00000000007D0000-0x00000000007D1000-memory.dmpFilesize
4KB
-
memory/2916-25-0x0000000000700000-0x0000000000702000-memory.dmpFilesize
8KB
-
memory/2916-24-0x0000000000700000-0x0000000000702000-memory.dmpFilesize
8KB
-
memory/2916-8-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-10-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-4-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-7-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-6-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB
-
memory/2916-1-0x0000000002680000-0x000000000370E000-memory.dmpFilesize
16.6MB