Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
1023451895ac837d95a13b21db728c1d90ff39e6e90b4de47a4341b238884004.dll
Resource
win7-20240221-en
General
-
Target
1023451895ac837d95a13b21db728c1d90ff39e6e90b4de47a4341b238884004.dll
-
Size
120KB
-
MD5
80acbf9b26cd09f9969db4be655b2863
-
SHA1
56934e37a65d38d128db673d04f7869e74a71382
-
SHA256
1023451895ac837d95a13b21db728c1d90ff39e6e90b4de47a4341b238884004
-
SHA512
eecadb5f032d968674c302012d78bfaa39973416d0f96249680f994958275f7fc662bcb30668b8a20fd99677e9d0c4ba935f4a9f2eeea620ccd53003f36df201
-
SSDEEP
3072:CP2LnVuScaEPM1CqWVVByNgQI5DHqqn6e8:jjdEYk5yhIzf6e
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
e57517b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57517b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57517b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57517b.exe -
Processes:
e57517b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57517b.exe -
Processes:
e57517b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57517b.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 32 IoCs
Processes:
resource yara_rule behavioral2/memory/1472-8-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-10-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-20-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-34-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-21-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-31-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-11-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-24-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-9-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-35-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-36-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-37-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-38-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-39-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-40-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-42-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-56-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-57-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-59-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-72-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-75-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-76-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-78-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-80-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-82-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-83-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-85-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-87-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-88-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-89-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1472-90-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3964-123-0x0000000000B40000-0x0000000001BFA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 39 IoCs
Processes:
resource yara_rule behavioral2/memory/1472-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1472-8-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-10-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-20-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-34-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-21-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-31-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-11-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4764-25-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1472-24-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-9-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-35-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-36-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-37-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-38-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-39-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-40-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-42-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4580-55-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1472-56-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-57-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-59-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-72-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-75-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-76-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-78-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-80-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-82-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-83-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-85-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-87-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-88-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-89-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-90-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/1472-109-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4764-113-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3964-118-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4580-122-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3964-123-0x0000000000B40000-0x0000000001BFA000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
e57517b.exee5752a4.exee576d50.exee576d7f.exepid process 1472 e57517b.exe 4764 e5752a4.exe 3964 e576d50.exe 4580 e576d7f.exe -
Processes:
resource yara_rule behavioral2/memory/1472-8-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-10-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-20-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-34-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-21-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-31-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-11-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-24-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-9-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-35-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-36-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-37-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-38-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-39-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-40-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-42-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-56-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-57-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-59-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-72-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-75-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-76-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-78-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-80-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-82-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-83-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-85-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-87-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-88-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-89-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/1472-90-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/3964-123-0x0000000000B40000-0x0000000001BFA000-memory.dmp upx -
Processes:
e57517b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57517b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57517b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57517b.exe -
Processes:
e57517b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57517b.exe -
Enumerates connected drives 3 TTPs 13 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e57517b.exedescription ioc process File opened (read-only) \??\K: e57517b.exe File opened (read-only) \??\M: e57517b.exe File opened (read-only) \??\P: e57517b.exe File opened (read-only) \??\Q: e57517b.exe File opened (read-only) \??\L: e57517b.exe File opened (read-only) \??\N: e57517b.exe File opened (read-only) \??\R: e57517b.exe File opened (read-only) \??\G: e57517b.exe File opened (read-only) \??\I: e57517b.exe File opened (read-only) \??\J: e57517b.exe File opened (read-only) \??\O: e57517b.exe File opened (read-only) \??\E: e57517b.exe File opened (read-only) \??\H: e57517b.exe -
Drops file in Program Files directory 4 IoCs
Processes:
e57517b.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e57517b.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e57517b.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e57517b.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e57517b.exe -
Drops file in Windows directory 2 IoCs
Processes:
e57517b.exedescription ioc process File created C:\Windows\e5751c9 e57517b.exe File opened for modification C:\Windows\SYSTEM.INI e57517b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e57517b.exepid process 1472 e57517b.exe 1472 e57517b.exe 1472 e57517b.exe 1472 e57517b.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e57517b.exedescription pid process Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe Token: SeDebugPrivilege 1472 e57517b.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
rundll32.exerundll32.exee57517b.exedescription pid process target process PID 1856 wrote to memory of 4136 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 4136 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 4136 1856 rundll32.exe rundll32.exe PID 4136 wrote to memory of 1472 4136 rundll32.exe e57517b.exe PID 4136 wrote to memory of 1472 4136 rundll32.exe e57517b.exe PID 4136 wrote to memory of 1472 4136 rundll32.exe e57517b.exe PID 1472 wrote to memory of 788 1472 e57517b.exe fontdrvhost.exe PID 1472 wrote to memory of 792 1472 e57517b.exe fontdrvhost.exe PID 1472 wrote to memory of 1020 1472 e57517b.exe dwm.exe PID 1472 wrote to memory of 2992 1472 e57517b.exe sihost.exe PID 1472 wrote to memory of 3020 1472 e57517b.exe svchost.exe PID 1472 wrote to memory of 2280 1472 e57517b.exe taskhostw.exe PID 1472 wrote to memory of 3372 1472 e57517b.exe Explorer.EXE PID 1472 wrote to memory of 3548 1472 e57517b.exe svchost.exe PID 1472 wrote to memory of 3760 1472 e57517b.exe DllHost.exe PID 1472 wrote to memory of 3856 1472 e57517b.exe StartMenuExperienceHost.exe PID 1472 wrote to memory of 3956 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 4060 1472 e57517b.exe SearchApp.exe PID 1472 wrote to memory of 4116 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 4712 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 3980 1472 e57517b.exe TextInputHost.exe PID 1472 wrote to memory of 1360 1472 e57517b.exe backgroundTaskHost.exe PID 1472 wrote to memory of 1856 1472 e57517b.exe rundll32.exe PID 1472 wrote to memory of 4136 1472 e57517b.exe rundll32.exe PID 1472 wrote to memory of 4136 1472 e57517b.exe rundll32.exe PID 4136 wrote to memory of 4764 4136 rundll32.exe e5752a4.exe PID 4136 wrote to memory of 4764 4136 rundll32.exe e5752a4.exe PID 4136 wrote to memory of 4764 4136 rundll32.exe e5752a4.exe PID 4136 wrote to memory of 3964 4136 rundll32.exe e576d50.exe PID 4136 wrote to memory of 3964 4136 rundll32.exe e576d50.exe PID 4136 wrote to memory of 3964 4136 rundll32.exe e576d50.exe PID 4136 wrote to memory of 4580 4136 rundll32.exe e576d7f.exe PID 4136 wrote to memory of 4580 4136 rundll32.exe e576d7f.exe PID 4136 wrote to memory of 4580 4136 rundll32.exe e576d7f.exe PID 1472 wrote to memory of 788 1472 e57517b.exe fontdrvhost.exe PID 1472 wrote to memory of 792 1472 e57517b.exe fontdrvhost.exe PID 1472 wrote to memory of 1020 1472 e57517b.exe dwm.exe PID 1472 wrote to memory of 2992 1472 e57517b.exe sihost.exe PID 1472 wrote to memory of 3020 1472 e57517b.exe svchost.exe PID 1472 wrote to memory of 2280 1472 e57517b.exe taskhostw.exe PID 1472 wrote to memory of 3372 1472 e57517b.exe Explorer.EXE PID 1472 wrote to memory of 3548 1472 e57517b.exe svchost.exe PID 1472 wrote to memory of 3760 1472 e57517b.exe DllHost.exe PID 1472 wrote to memory of 3856 1472 e57517b.exe StartMenuExperienceHost.exe PID 1472 wrote to memory of 3956 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 4060 1472 e57517b.exe SearchApp.exe PID 1472 wrote to memory of 4116 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 4712 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 3980 1472 e57517b.exe TextInputHost.exe PID 1472 wrote to memory of 4764 1472 e57517b.exe e5752a4.exe PID 1472 wrote to memory of 4764 1472 e57517b.exe e5752a4.exe PID 1472 wrote to memory of 4808 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 5076 1472 e57517b.exe RuntimeBroker.exe PID 1472 wrote to memory of 3964 1472 e57517b.exe e576d50.exe PID 1472 wrote to memory of 3964 1472 e57517b.exe e576d50.exe PID 1472 wrote to memory of 4580 1472 e57517b.exe e576d7f.exe PID 1472 wrote to memory of 4580 1472 e57517b.exe e576d7f.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
e57517b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57517b.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1023451895ac837d95a13b21db728c1d90ff39e6e90b4de47a4341b238884004.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1023451895ac837d95a13b21db728c1d90ff39e6e90b4de47a4341b238884004.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e57517b.exeC:\Users\Admin\AppData\Local\Temp\e57517b.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e5752a4.exeC:\Users\Admin\AppData\Local\Temp\e5752a4.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e576d50.exeC:\Users\Admin\AppData\Local\Temp\e576d50.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e576d7f.exeC:\Users\Admin\AppData\Local\Temp\e576d7f.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e57517b.exeFilesize
97KB
MD5205ac0dffe632b9743cff3d38bd1bea4
SHA1d02471bb7a32bf8de383c2a54160626c047bd638
SHA2566ba4f5aa5b8e9f02c748b12d655ae250cf73809cc05ade57dd363730cad62a98
SHA512af338f7c798141670b3cc53b6907bfb212cc56b32aa807835b068d6b7c4c3c1a8aea23d5ceda85ddfce5b50d9005b3966c01ae10c07780c6ac75e38006ee030b
-
memory/1472-57-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-78-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-8-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-10-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-26-0x0000000003660000-0x0000000003662000-memory.dmpFilesize
8KB
-
memory/1472-20-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-109-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1472-100-0x0000000003660000-0x0000000003662000-memory.dmpFilesize
8KB
-
memory/1472-34-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-21-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-31-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-11-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-90-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-24-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-89-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-15-0x0000000003D30000-0x0000000003D31000-memory.dmpFilesize
4KB
-
memory/1472-88-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-87-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-9-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-35-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-36-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-37-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-38-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-39-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-40-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-59-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-56-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-85-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-83-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-33-0x0000000003660000-0x0000000003662000-memory.dmpFilesize
8KB
-
memory/1472-42-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-82-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-80-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1472-76-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-75-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/1472-72-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/3964-67-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3964-49-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3964-63-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3964-70-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3964-123-0x0000000000B40000-0x0000000001BFA000-memory.dmpFilesize
16.7MB
-
memory/3964-118-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3964-124-0x0000000000B40000-0x0000000001BFA000-memory.dmpFilesize
16.7MB
-
memory/4136-32-0x0000000003590000-0x0000000003592000-memory.dmpFilesize
8KB
-
memory/4136-13-0x0000000003720000-0x0000000003721000-memory.dmpFilesize
4KB
-
memory/4136-16-0x0000000003590000-0x0000000003592000-memory.dmpFilesize
8KB
-
memory/4136-12-0x0000000003590000-0x0000000003592000-memory.dmpFilesize
8KB
-
memory/4136-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/4580-122-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4580-55-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4580-68-0x00000000001C0000-0x00000000001C2000-memory.dmpFilesize
8KB
-
memory/4580-71-0x00000000001C0000-0x00000000001C2000-memory.dmpFilesize
8KB
-
memory/4580-66-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/4764-25-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4764-69-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4764-113-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4764-61-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4764-64-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB