Analysis
-
max time kernel
53s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 00:19
Static task
static1
Behavioral task
behavioral1
Sample
88a865338a4e207e295287073aac691a9889bef916171ff4783dce329e831716.dll
Resource
win7-20240221-en
General
-
Target
88a865338a4e207e295287073aac691a9889bef916171ff4783dce329e831716.dll
-
Size
120KB
-
MD5
790a33c41eac8a357635db21eec847fb
-
SHA1
a1e75f3a6c158b231c1c0103265f208767fe01bc
-
SHA256
88a865338a4e207e295287073aac691a9889bef916171ff4783dce329e831716
-
SHA512
dcbc7f1986ff4661593d751a612877e953e13f4fa310eb0da07d423fce8ad88c0c33c01743c2b82ac452322841b389f363e6189cccb240b126bba5a13415399e
-
SSDEEP
3072:MmL+vcHn4cQZaQ8fOverlUZz3ISMTAZg4lO4FB:QcBQt8fO8UZz3RMTAZg404/
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
e575f85.exee5787ae.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e575f85.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e575f85.exe -
Processes:
e5787ae.exee575f85.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575f85.exe -
Processes:
e5787ae.exee575f85.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575f85.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 30 IoCs
Processes:
resource yara_rule behavioral2/memory/1424-6-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-9-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-10-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-11-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-20-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-31-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-34-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-36-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-19-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-8-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-35-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-38-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-37-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-39-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-40-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-41-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-43-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-60-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-61-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-63-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-65-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-66-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-68-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-69-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-72-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-73-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-74-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1424-75-0x0000000000800000-0x00000000018BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1320-110-0x0000000000B50000-0x0000000001C0A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/1320-146-0x0000000000B50000-0x0000000001C0A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 34 IoCs
Processes:
resource yara_rule behavioral2/memory/1424-6-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-9-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-10-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-11-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-20-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/4756-33-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1424-31-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-34-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-36-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-19-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-8-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-35-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-38-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-37-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-39-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-40-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-41-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-43-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-60-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-61-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-63-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-65-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-66-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-68-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-69-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-72-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-73-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-74-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-75-0x0000000000800000-0x00000000018BA000-memory.dmp UPX behavioral2/memory/1424-94-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4756-98-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1320-110-0x0000000000B50000-0x0000000001C0A000-memory.dmp UPX behavioral2/memory/1320-147-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1320-146-0x0000000000B50000-0x0000000001C0A000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e575f85.exee57606f.exee5787ae.exepid process 1424 e575f85.exe 4756 e57606f.exe 1320 e5787ae.exe -
Processes:
resource yara_rule behavioral2/memory/1424-6-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-9-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-10-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-11-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-20-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-31-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-34-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-36-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-19-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-8-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-35-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-38-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-37-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-39-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-40-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-41-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-43-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-60-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-61-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-63-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-65-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-66-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-68-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-69-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-72-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-73-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-74-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1424-75-0x0000000000800000-0x00000000018BA000-memory.dmp upx behavioral2/memory/1320-110-0x0000000000B50000-0x0000000001C0A000-memory.dmp upx behavioral2/memory/1320-146-0x0000000000B50000-0x0000000001C0A000-memory.dmp upx -
Processes:
e575f85.exee5787ae.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575f85.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5787ae.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5787ae.exe -
Processes:
e5787ae.exee575f85.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5787ae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575f85.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e575f85.exee5787ae.exedescription ioc process File opened (read-only) \??\L: e575f85.exe File opened (read-only) \??\G: e575f85.exe File opened (read-only) \??\I: e575f85.exe File opened (read-only) \??\K: e575f85.exe File opened (read-only) \??\M: e575f85.exe File opened (read-only) \??\E: e5787ae.exe File opened (read-only) \??\J: e575f85.exe File opened (read-only) \??\O: e575f85.exe File opened (read-only) \??\H: e5787ae.exe File opened (read-only) \??\E: e575f85.exe File opened (read-only) \??\H: e575f85.exe File opened (read-only) \??\N: e575f85.exe File opened (read-only) \??\G: e5787ae.exe File opened (read-only) \??\I: e5787ae.exe -
Drops file in Program Files directory 3 IoCs
Processes:
e575f85.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zFM.exe e575f85.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e575f85.exe File opened for modification C:\Program Files\7-Zip\7z.exe e575f85.exe -
Drops file in Windows directory 3 IoCs
Processes:
e575f85.exee5787ae.exedescription ioc process File created C:\Windows\e575fd3 e575f85.exe File opened for modification C:\Windows\SYSTEM.INI e575f85.exe File created C:\Windows\e57b006 e5787ae.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e575f85.exee5787ae.exepid process 1424 e575f85.exe 1424 e575f85.exe 1424 e575f85.exe 1424 e575f85.exe 1320 e5787ae.exe 1320 e5787ae.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e575f85.exedescription pid process Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe Token: SeDebugPrivilege 1424 e575f85.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee575f85.exee5787ae.exedescription pid process target process PID 2516 wrote to memory of 2384 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 2384 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 2384 2516 rundll32.exe rundll32.exe PID 2384 wrote to memory of 1424 2384 rundll32.exe e575f85.exe PID 2384 wrote to memory of 1424 2384 rundll32.exe e575f85.exe PID 2384 wrote to memory of 1424 2384 rundll32.exe e575f85.exe PID 1424 wrote to memory of 772 1424 e575f85.exe fontdrvhost.exe PID 1424 wrote to memory of 780 1424 e575f85.exe fontdrvhost.exe PID 1424 wrote to memory of 1020 1424 e575f85.exe dwm.exe PID 1424 wrote to memory of 2552 1424 e575f85.exe sihost.exe PID 1424 wrote to memory of 2568 1424 e575f85.exe svchost.exe PID 1424 wrote to memory of 2644 1424 e575f85.exe taskhostw.exe PID 1424 wrote to memory of 3492 1424 e575f85.exe Explorer.EXE PID 1424 wrote to memory of 3648 1424 e575f85.exe svchost.exe PID 1424 wrote to memory of 3844 1424 e575f85.exe DllHost.exe PID 1424 wrote to memory of 3944 1424 e575f85.exe StartMenuExperienceHost.exe PID 1424 wrote to memory of 4004 1424 e575f85.exe RuntimeBroker.exe PID 1424 wrote to memory of 404 1424 e575f85.exe SearchApp.exe PID 1424 wrote to memory of 60 1424 e575f85.exe RuntimeBroker.exe PID 1424 wrote to memory of 4220 1424 e575f85.exe TextInputHost.exe PID 1424 wrote to memory of 2376 1424 e575f85.exe RuntimeBroker.exe PID 1424 wrote to memory of 2516 1424 e575f85.exe rundll32.exe PID 1424 wrote to memory of 2384 1424 e575f85.exe rundll32.exe PID 1424 wrote to memory of 2384 1424 e575f85.exe rundll32.exe PID 2384 wrote to memory of 4756 2384 rundll32.exe e57606f.exe PID 2384 wrote to memory of 4756 2384 rundll32.exe e57606f.exe PID 2384 wrote to memory of 4756 2384 rundll32.exe e57606f.exe PID 2384 wrote to memory of 1320 2384 rundll32.exe e5787ae.exe PID 2384 wrote to memory of 1320 2384 rundll32.exe e5787ae.exe PID 2384 wrote to memory of 1320 2384 rundll32.exe e5787ae.exe PID 1424 wrote to memory of 772 1424 e575f85.exe fontdrvhost.exe PID 1424 wrote to memory of 780 1424 e575f85.exe fontdrvhost.exe PID 1424 wrote to memory of 1020 1424 e575f85.exe dwm.exe PID 1424 wrote to memory of 2552 1424 e575f85.exe sihost.exe PID 1424 wrote to memory of 2568 1424 e575f85.exe svchost.exe PID 1424 wrote to memory of 2644 1424 e575f85.exe taskhostw.exe PID 1424 wrote to memory of 3492 1424 e575f85.exe Explorer.EXE PID 1424 wrote to memory of 3648 1424 e575f85.exe svchost.exe PID 1424 wrote to memory of 3844 1424 e575f85.exe DllHost.exe PID 1424 wrote to memory of 3944 1424 e575f85.exe StartMenuExperienceHost.exe PID 1424 wrote to memory of 4004 1424 e575f85.exe RuntimeBroker.exe PID 1424 wrote to memory of 404 1424 e575f85.exe SearchApp.exe PID 1424 wrote to memory of 60 1424 e575f85.exe RuntimeBroker.exe PID 1424 wrote to memory of 4220 1424 e575f85.exe TextInputHost.exe PID 1424 wrote to memory of 2376 1424 e575f85.exe RuntimeBroker.exe PID 1424 wrote to memory of 4756 1424 e575f85.exe e57606f.exe PID 1424 wrote to memory of 4756 1424 e575f85.exe e57606f.exe PID 1424 wrote to memory of 1320 1424 e575f85.exe e5787ae.exe PID 1424 wrote to memory of 1320 1424 e575f85.exe e5787ae.exe PID 1320 wrote to memory of 772 1320 e5787ae.exe fontdrvhost.exe PID 1320 wrote to memory of 780 1320 e5787ae.exe fontdrvhost.exe PID 1320 wrote to memory of 1020 1320 e5787ae.exe dwm.exe PID 1320 wrote to memory of 2552 1320 e5787ae.exe sihost.exe PID 1320 wrote to memory of 2568 1320 e5787ae.exe svchost.exe PID 1320 wrote to memory of 2644 1320 e5787ae.exe taskhostw.exe PID 1320 wrote to memory of 3492 1320 e5787ae.exe Explorer.EXE PID 1320 wrote to memory of 3648 1320 e5787ae.exe svchost.exe PID 1320 wrote to memory of 3844 1320 e5787ae.exe DllHost.exe PID 1320 wrote to memory of 3944 1320 e5787ae.exe StartMenuExperienceHost.exe PID 1320 wrote to memory of 4004 1320 e5787ae.exe RuntimeBroker.exe PID 1320 wrote to memory of 404 1320 e5787ae.exe SearchApp.exe PID 1320 wrote to memory of 60 1320 e5787ae.exe RuntimeBroker.exe PID 1320 wrote to memory of 4220 1320 e5787ae.exe TextInputHost.exe PID 1320 wrote to memory of 2376 1320 e5787ae.exe RuntimeBroker.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e575f85.exee5787ae.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575f85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5787ae.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88a865338a4e207e295287073aac691a9889bef916171ff4783dce329e831716.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88a865338a4e207e295287073aac691a9889bef916171ff4783dce329e831716.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e575f85.exeC:\Users\Admin\AppData\Local\Temp\e575f85.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e57606f.exeC:\Users\Admin\AppData\Local\Temp\e57606f.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e5787ae.exeC:\Users\Admin\AppData\Local\Temp\e5787ae.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e575f85.exeFilesize
97KB
MD5581792bfeaaaf2aae9bfc6d34194e86a
SHA1ec92410c3e59ad5606105a905510dca29eb36173
SHA2561d7bcfbb35be5304d7d878847086b35ca7cdd0e264ac070ebe7e350457ea0e95
SHA5128efb5116a51b71f5e40087d1d2b1bbd44247b656a5bac58d3b69f94068c5f81e17e6887ea61428cdefc97ec92af869ca13676b0b40d735e39c9fffcbb30b2b29
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5261f1dcaad76628a1102ed4ac682ca91
SHA1e19e8dd91d848c05a51508c45380b13e83feab7b
SHA256d8b5e424acc1c8b6636aefc2a781f4c6c9a671a02b666f7a77ab267e704a17fa
SHA512fc605d7c8949c98e42f93cabf7112570164c6277920709129f14a340834341672fab82ca9c62d7ebbe8177ad0aade4b00eee5f10b86f52189c112fbede884d57
-
memory/1320-146-0x0000000000B50000-0x0000000001C0A000-memory.dmpFilesize
16.7MB
-
memory/1320-147-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1320-110-0x0000000000B50000-0x0000000001C0A000-memory.dmpFilesize
16.7MB
-
memory/1320-59-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1320-55-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1320-57-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1320-51-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1424-43-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-20-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-34-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-32-0x00000000005F0000-0x00000000005F2000-memory.dmpFilesize
8KB
-
memory/1424-36-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-28-0x00000000005F0000-0x00000000005F2000-memory.dmpFilesize
8KB
-
memory/1424-19-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-4-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1424-15-0x0000000001A40000-0x0000000001A41000-memory.dmpFilesize
4KB
-
memory/1424-6-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-8-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-35-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-38-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-37-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-39-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-40-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-41-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-9-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-10-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-94-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1424-86-0x00000000005F0000-0x00000000005F2000-memory.dmpFilesize
8KB
-
memory/1424-75-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-31-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-74-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-73-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-11-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-72-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-60-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-61-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-63-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-65-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-66-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-68-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/1424-69-0x0000000000800000-0x00000000018BA000-memory.dmpFilesize
16.7MB
-
memory/2384-21-0x00000000009A0000-0x00000000009A2000-memory.dmpFilesize
8KB
-
memory/2384-3-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2384-48-0x00000000009A0000-0x00000000009A2000-memory.dmpFilesize
8KB
-
memory/2384-22-0x00000000009C0000-0x00000000009C1000-memory.dmpFilesize
4KB
-
memory/2384-12-0x00000000009A0000-0x00000000009A2000-memory.dmpFilesize
8KB
-
memory/2384-18-0x00000000009A0000-0x00000000009A2000-memory.dmpFilesize
8KB
-
memory/4756-58-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4756-53-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4756-56-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4756-33-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4756-98-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB