Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
eeca213861a77b269898119c761c6907341d34f40fea478124f1a3370e5c3c21.dll
Resource
win7-20240508-en
General
-
Target
eeca213861a77b269898119c761c6907341d34f40fea478124f1a3370e5c3c21.dll
-
Size
120KB
-
MD5
b771cf7746329eb48e70de3e70e8496a
-
SHA1
7d4eab5058e94d77e9a113ca8e5e3ed5c39c1a33
-
SHA256
eeca213861a77b269898119c761c6907341d34f40fea478124f1a3370e5c3c21
-
SHA512
7074887a83c05297e26484bd5ab0e4eba1d6d271c2a4dfe80ea492474d5a5f1f26200e8697334489bf21541905a85ed5b379fe664d66ec19573e7d60d0a88613
-
SSDEEP
1536:5hNNLAxkf/4zfhzl6lcjVQKSSWQykp45MT6vx+ZZ1U+lVhaMX5n4vJ/b7:5hNvefpl6+7WQP25M+0r+6d5Gb7
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f762990.exef760df5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f762990.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f762990.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f760df5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f760df5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f760df5.exe -
Processes:
f762990.exef760df5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760df5.exe -
Processes:
f760df5.exef762990.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762990.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 24 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-17-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-14-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-19-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-12-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-16-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-15-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-21-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-20-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-18-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-22-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-62-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-63-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-64-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-65-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-66-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-68-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-69-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-83-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-85-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-88-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-107-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1736-148-0x00000000006F0000-0x00000000017AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2252-161-0x0000000000920000-0x00000000019DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2252-203-0x0000000000920000-0x00000000019DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 28 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-17-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-14-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-19-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-12-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/2764-54-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/1736-16-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-15-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-21-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-20-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-18-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-22-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-62-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-63-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-64-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-65-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-66-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-68-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-69-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-83-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-85-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-88-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-107-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/1736-149-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2764-153-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/1736-148-0x00000000006F0000-0x00000000017AA000-memory.dmp UPX behavioral1/memory/2252-161-0x0000000000920000-0x00000000019DA000-memory.dmp UPX behavioral1/memory/2252-204-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2252-203-0x0000000000920000-0x00000000019DA000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
f760df5.exef760f6c.exef762990.exepid process 1736 f760df5.exe 2764 f760f6c.exe 2252 f762990.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/1736-17-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-14-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-19-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-12-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-16-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-15-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-21-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-20-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-18-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-22-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-62-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-63-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-64-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-65-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-66-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-68-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-69-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-83-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-85-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-88-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-107-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/1736-148-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2252-161-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2252-203-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Processes:
f762990.exef760df5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762990.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760df5.exe -
Processes:
f760df5.exef762990.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760df5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762990.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f760df5.exef762990.exedescription ioc process File opened (read-only) \??\E: f760df5.exe File opened (read-only) \??\K: f760df5.exe File opened (read-only) \??\O: f760df5.exe File opened (read-only) \??\S: f760df5.exe File opened (read-only) \??\T: f760df5.exe File opened (read-only) \??\J: f760df5.exe File opened (read-only) \??\M: f760df5.exe File opened (read-only) \??\R: f760df5.exe File opened (read-only) \??\I: f760df5.exe File opened (read-only) \??\L: f760df5.exe File opened (read-only) \??\E: f762990.exe File opened (read-only) \??\G: f762990.exe File opened (read-only) \??\G: f760df5.exe File opened (read-only) \??\H: f760df5.exe File opened (read-only) \??\N: f760df5.exe File opened (read-only) \??\P: f760df5.exe File opened (read-only) \??\Q: f760df5.exe -
Drops file in Windows directory 3 IoCs
Processes:
f760df5.exef762990.exedescription ioc process File created C:\Windows\f760e53 f760df5.exe File opened for modification C:\Windows\SYSTEM.INI f760df5.exe File created C:\Windows\f765e17 f762990.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f760df5.exef762990.exepid process 1736 f760df5.exe 1736 f760df5.exe 2252 f762990.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f760df5.exef762990.exedescription pid process Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 1736 f760df5.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe Token: SeDebugPrivilege 2252 f762990.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef760df5.exef762990.exedescription pid process target process PID 2740 wrote to memory of 1776 2740 rundll32.exe rundll32.exe PID 2740 wrote to memory of 1776 2740 rundll32.exe rundll32.exe PID 2740 wrote to memory of 1776 2740 rundll32.exe rundll32.exe PID 2740 wrote to memory of 1776 2740 rundll32.exe rundll32.exe PID 2740 wrote to memory of 1776 2740 rundll32.exe rundll32.exe PID 2740 wrote to memory of 1776 2740 rundll32.exe rundll32.exe PID 2740 wrote to memory of 1776 2740 rundll32.exe rundll32.exe PID 1776 wrote to memory of 1736 1776 rundll32.exe f760df5.exe PID 1776 wrote to memory of 1736 1776 rundll32.exe f760df5.exe PID 1776 wrote to memory of 1736 1776 rundll32.exe f760df5.exe PID 1776 wrote to memory of 1736 1776 rundll32.exe f760df5.exe PID 1736 wrote to memory of 1100 1736 f760df5.exe taskhost.exe PID 1736 wrote to memory of 1160 1736 f760df5.exe Dwm.exe PID 1736 wrote to memory of 1184 1736 f760df5.exe Explorer.EXE PID 1736 wrote to memory of 2376 1736 f760df5.exe DllHost.exe PID 1736 wrote to memory of 2740 1736 f760df5.exe rundll32.exe PID 1736 wrote to memory of 1776 1736 f760df5.exe rundll32.exe PID 1736 wrote to memory of 1776 1736 f760df5.exe rundll32.exe PID 1776 wrote to memory of 2764 1776 rundll32.exe f760f6c.exe PID 1776 wrote to memory of 2764 1776 rundll32.exe f760f6c.exe PID 1776 wrote to memory of 2764 1776 rundll32.exe f760f6c.exe PID 1776 wrote to memory of 2764 1776 rundll32.exe f760f6c.exe PID 1776 wrote to memory of 2252 1776 rundll32.exe f762990.exe PID 1776 wrote to memory of 2252 1776 rundll32.exe f762990.exe PID 1776 wrote to memory of 2252 1776 rundll32.exe f762990.exe PID 1776 wrote to memory of 2252 1776 rundll32.exe f762990.exe PID 1736 wrote to memory of 1100 1736 f760df5.exe taskhost.exe PID 1736 wrote to memory of 1160 1736 f760df5.exe Dwm.exe PID 1736 wrote to memory of 1184 1736 f760df5.exe Explorer.EXE PID 1736 wrote to memory of 2764 1736 f760df5.exe f760f6c.exe PID 1736 wrote to memory of 2764 1736 f760df5.exe f760f6c.exe PID 1736 wrote to memory of 2252 1736 f760df5.exe f762990.exe PID 1736 wrote to memory of 2252 1736 f760df5.exe f762990.exe PID 2252 wrote to memory of 1100 2252 f762990.exe taskhost.exe PID 2252 wrote to memory of 1160 2252 f762990.exe Dwm.exe PID 2252 wrote to memory of 1184 2252 f762990.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f762990.exef760df5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760df5.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eeca213861a77b269898119c761c6907341d34f40fea478124f1a3370e5c3c21.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eeca213861a77b269898119c761c6907341d34f40fea478124f1a3370e5c3c21.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f760df5.exeC:\Users\Admin\AppData\Local\Temp\f760df5.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f760f6c.exeC:\Users\Admin\AppData\Local\Temp\f760f6c.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f762990.exeC:\Users\Admin\AppData\Local\Temp\f762990.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5c6f43c6d381c76d1e23b57520d811bb0
SHA1f3987e07aad614f9618214cd075a37be9b325879
SHA2566d84af5858d81e34852a7b8fd13e59477475bf2642068da09ea89a169443111e
SHA512bc746a5e4a7ee34a708bd4bb25fe9f683bbdeeffac44b058b611ce4c7887e933a00000d399720c7c7d74186e29c9e2034db9df22860a4ef987451de597b39aa5
-
\Users\Admin\AppData\Local\Temp\f760df5.exeFilesize
97KB
MD565e2cbd4e7e5643cc66e594668e82de5
SHA1f92d6006c258a110fc33cd683ed2facc6fff7677
SHA2564063bb8a5542b1b2e0d0b4208064c63c59b614cae41d78e7e9b97e61c55d9ded
SHA512a55881e5373b6fe517e2e132725306367d7a279db3dd3d66c3ec0093a15a2f7ae1031291cd2a5c57ae6710cba062c23b84443d3c551226acbd1a896de626d675
-
memory/1100-23-0x0000000000210000-0x0000000000212000-memory.dmpFilesize
8KB
-
memory/1736-62-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-149-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-17-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-14-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-19-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-12-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-64-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-65-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-16-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-42-0x0000000000540000-0x0000000000541000-memory.dmpFilesize
4KB
-
memory/1736-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-15-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-148-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-68-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-127-0x0000000000530000-0x0000000000532000-memory.dmpFilesize
8KB
-
memory/1736-21-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-20-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-18-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-63-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-107-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-60-0x0000000000530000-0x0000000000532000-memory.dmpFilesize
8KB
-
memory/1736-22-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-61-0x0000000000530000-0x0000000000532000-memory.dmpFilesize
8KB
-
memory/1736-88-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-85-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-83-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-69-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1736-66-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/1776-50-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/1776-31-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/1776-41-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1776-81-0x0000000000130000-0x0000000000132000-memory.dmpFilesize
8KB
-
memory/1776-78-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/1776-9-0x0000000000130000-0x0000000000142000-memory.dmpFilesize
72KB
-
memory/1776-53-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/1776-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/1776-32-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1776-10-0x0000000000130000-0x0000000000142000-memory.dmpFilesize
72KB
-
memory/1776-52-0x00000000001D0000-0x00000000001E2000-memory.dmpFilesize
72KB
-
memory/2252-106-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2252-103-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2252-204-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2252-104-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2252-82-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2252-161-0x0000000000920000-0x00000000019DA000-memory.dmpFilesize
16.7MB
-
memory/2252-203-0x0000000000920000-0x00000000019DA000-memory.dmpFilesize
16.7MB
-
memory/2764-97-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2764-96-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2764-105-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2764-153-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2764-54-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB