Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll
Resource
win7-20231129-en
General
-
Target
8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll
-
Size
120KB
-
MD5
70102e80b6d50af10dea65557a520381
-
SHA1
d6842fb652f1fe3ad8e8b18558c36a7e0a538e08
-
SHA256
8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920
-
SHA512
096a9bcbc11803236ce4cd7c6763ca4916d3d51a5487f3bff6c88452c6b503810c67c21adec3e46210b9f5fa42a5c0b8245a7b35186e21eb6550d27579ab7f15
-
SSDEEP
3072:WwPcuvxQ0GN2OG3O1T9/ywvydRqORRTq:pPcqjGfG3O1ZGRqOXTq
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f760a4d.exef760bd3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f760a4d.exe -
Processes:
f760a4d.exef760bd3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760bd3.exe -
Processes:
f760bd3.exef760a4d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760bd3.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 23 IoCs
Processes:
resource yara_rule behavioral1/memory/2768-14-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-15-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-17-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-19-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-16-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-12-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-22-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-20-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-21-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-18-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-62-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-63-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-64-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-65-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-66-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-68-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-81-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-82-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-102-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-106-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2768-146-0x00000000006B0000-0x000000000176A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2388-154-0x0000000000A10000-0x0000000001ACA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2388-181-0x0000000000A10000-0x0000000001ACA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 28 IoCs
Processes:
resource yara_rule behavioral1/memory/2768-11-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2768-14-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-15-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-17-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-19-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-16-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-12-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-22-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-20-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-21-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-18-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2388-61-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2768-62-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-63-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-64-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-65-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-66-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-68-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-81-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-82-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-102-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-106-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2768-145-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2768-146-0x00000000006B0000-0x000000000176A000-memory.dmp UPX behavioral1/memory/2388-154-0x0000000000A10000-0x0000000001ACA000-memory.dmp UPX behavioral1/memory/2388-181-0x0000000000A10000-0x0000000001ACA000-memory.dmp UPX behavioral1/memory/2388-180-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/3056-185-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
f760a4d.exef760bd3.exef762b93.exepid process 2768 f760a4d.exe 2388 f760bd3.exe 3056 f762b93.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2960 rundll32.exe 2960 rundll32.exe 2960 rundll32.exe 2960 rundll32.exe 2960 rundll32.exe 2960 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2768-14-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-15-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-17-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-19-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-16-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-12-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-22-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-20-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-21-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-18-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-62-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-63-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-64-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-65-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-66-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-68-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-81-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-82-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-102-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-106-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2768-146-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2388-154-0x0000000000A10000-0x0000000001ACA000-memory.dmp upx behavioral1/memory/2388-181-0x0000000000A10000-0x0000000001ACA000-memory.dmp upx -
Processes:
f760a4d.exef760bd3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760a4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760a4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760bd3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760bd3.exe -
Processes:
f760a4d.exef760bd3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760bd3.exe -
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f760a4d.exedescription ioc process File opened (read-only) \??\L: f760a4d.exe File opened (read-only) \??\P: f760a4d.exe File opened (read-only) \??\E: f760a4d.exe File opened (read-only) \??\G: f760a4d.exe File opened (read-only) \??\J: f760a4d.exe File opened (read-only) \??\K: f760a4d.exe File opened (read-only) \??\O: f760a4d.exe File opened (read-only) \??\Q: f760a4d.exe File opened (read-only) \??\H: f760a4d.exe File opened (read-only) \??\I: f760a4d.exe File opened (read-only) \??\M: f760a4d.exe File opened (read-only) \??\N: f760a4d.exe -
Drops file in Windows directory 3 IoCs
Processes:
f760bd3.exef760a4d.exedescription ioc process File created C:\Windows\f765abd f760bd3.exe File created C:\Windows\f760a9b f760a4d.exe File opened for modification C:\Windows\SYSTEM.INI f760a4d.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f760a4d.exef760bd3.exepid process 2768 f760a4d.exe 2768 f760a4d.exe 2388 f760bd3.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f760a4d.exef760bd3.exedescription pid process Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2768 f760a4d.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe Token: SeDebugPrivilege 2388 f760bd3.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef760a4d.exef760bd3.exedescription pid process target process PID 2900 wrote to memory of 2960 2900 rundll32.exe rundll32.exe PID 2900 wrote to memory of 2960 2900 rundll32.exe rundll32.exe PID 2900 wrote to memory of 2960 2900 rundll32.exe rundll32.exe PID 2900 wrote to memory of 2960 2900 rundll32.exe rundll32.exe PID 2900 wrote to memory of 2960 2900 rundll32.exe rundll32.exe PID 2900 wrote to memory of 2960 2900 rundll32.exe rundll32.exe PID 2900 wrote to memory of 2960 2900 rundll32.exe rundll32.exe PID 2960 wrote to memory of 2768 2960 rundll32.exe f760a4d.exe PID 2960 wrote to memory of 2768 2960 rundll32.exe f760a4d.exe PID 2960 wrote to memory of 2768 2960 rundll32.exe f760a4d.exe PID 2960 wrote to memory of 2768 2960 rundll32.exe f760a4d.exe PID 2768 wrote to memory of 1236 2768 f760a4d.exe taskhost.exe PID 2768 wrote to memory of 1340 2768 f760a4d.exe Dwm.exe PID 2768 wrote to memory of 1380 2768 f760a4d.exe Explorer.EXE PID 2768 wrote to memory of 1680 2768 f760a4d.exe DllHost.exe PID 2768 wrote to memory of 2900 2768 f760a4d.exe rundll32.exe PID 2768 wrote to memory of 2960 2768 f760a4d.exe rundll32.exe PID 2768 wrote to memory of 2960 2768 f760a4d.exe rundll32.exe PID 2960 wrote to memory of 2388 2960 rundll32.exe f760bd3.exe PID 2960 wrote to memory of 2388 2960 rundll32.exe f760bd3.exe PID 2960 wrote to memory of 2388 2960 rundll32.exe f760bd3.exe PID 2960 wrote to memory of 2388 2960 rundll32.exe f760bd3.exe PID 2960 wrote to memory of 3056 2960 rundll32.exe f762b93.exe PID 2960 wrote to memory of 3056 2960 rundll32.exe f762b93.exe PID 2960 wrote to memory of 3056 2960 rundll32.exe f762b93.exe PID 2960 wrote to memory of 3056 2960 rundll32.exe f762b93.exe PID 2768 wrote to memory of 1236 2768 f760a4d.exe taskhost.exe PID 2768 wrote to memory of 1340 2768 f760a4d.exe Dwm.exe PID 2768 wrote to memory of 1380 2768 f760a4d.exe Explorer.EXE PID 2768 wrote to memory of 2388 2768 f760a4d.exe f760bd3.exe PID 2768 wrote to memory of 2388 2768 f760a4d.exe f760bd3.exe PID 2768 wrote to memory of 3056 2768 f760a4d.exe f762b93.exe PID 2768 wrote to memory of 3056 2768 f760a4d.exe f762b93.exe PID 2388 wrote to memory of 1236 2388 f760bd3.exe taskhost.exe PID 2388 wrote to memory of 1340 2388 f760bd3.exe Dwm.exe PID 2388 wrote to memory of 1380 2388 f760bd3.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f760a4d.exef760bd3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760a4d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760bd3.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f760a4d.exeC:\Users\Admin\AppData\Local\Temp\f760a4d.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f760bd3.exeC:\Users\Admin\AppData\Local\Temp\f760bd3.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f762b93.exeC:\Users\Admin\AppData\Local\Temp\f762b93.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5518d8c96e15cd7fcd63c01204f2f4eb0
SHA1c0f09297848c6ab69d903d2ee404482fe4bb44db
SHA256e54304d0482cd847d65a507c9d2d22075805e931044105aa7679219ac07aca5e
SHA5128c507fa3b8944b9fbbf55c1376eb9cc6d026234ae9528ee5438623c6dd1af4b922aaec180ecafa3172c23a4df1717e22fc2e3cd4ac744684fda177039c6fa02a
-
\Users\Admin\AppData\Local\Temp\f760a4d.exeFilesize
97KB
MD5d43858b39b17c5ca024b5fbfea1fbb2a
SHA1562f9580c85b1d308c5f5e8d5273327262accce1
SHA2567f5e5c450437280aad2b6f492104640ada2b6ae687b5bf8e7494326f3bf83652
SHA512714db1a1c99c0fb9eb0b57e92084ce4199ec3c892f1ecefaa4bb23afc0e5d10b9f1dc4f5b4aeb112612db8f36fa61c36f9c8d2a5802dc67cf3c7f08b46074946
-
memory/1236-28-0x00000000002D0000-0x00000000002D2000-memory.dmpFilesize
8KB
-
memory/2388-180-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2388-181-0x0000000000A10000-0x0000000001ACA000-memory.dmpFilesize
16.7MB
-
memory/2388-154-0x0000000000A10000-0x0000000001ACA000-memory.dmpFilesize
16.7MB
-
memory/2388-94-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2388-95-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2388-93-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2388-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2768-20-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-66-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2768-14-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-50-0x0000000000330000-0x0000000000332000-memory.dmpFilesize
8KB
-
memory/2768-47-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/2768-21-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-146-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-145-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2768-12-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-18-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-16-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-112-0x0000000000330000-0x0000000000332000-memory.dmpFilesize
8KB
-
memory/2768-106-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-102-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-62-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-63-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-64-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-65-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-22-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-68-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-15-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-81-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-82-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-19-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2768-17-0x00000000006B0000-0x000000000176A000-memory.dmpFilesize
16.7MB
-
memory/2960-60-0x0000000000270000-0x0000000000272000-memory.dmpFilesize
8KB
-
memory/2960-48-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/2960-9-0x0000000000250000-0x0000000000262000-memory.dmpFilesize
72KB
-
memory/2960-57-0x0000000000270000-0x0000000000272000-memory.dmpFilesize
8KB
-
memory/2960-38-0x0000000000270000-0x0000000000272000-memory.dmpFilesize
8KB
-
memory/2960-59-0x00000000007C0000-0x00000000007D2000-memory.dmpFilesize
72KB
-
memory/2960-8-0x0000000000250000-0x0000000000262000-memory.dmpFilesize
72KB
-
memory/2960-39-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/2960-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3056-103-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/3056-80-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3056-101-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/3056-100-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/3056-185-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB