Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll
Resource
win7-20231129-en
General
-
Target
8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll
-
Size
120KB
-
MD5
70102e80b6d50af10dea65557a520381
-
SHA1
d6842fb652f1fe3ad8e8b18558c36a7e0a538e08
-
SHA256
8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920
-
SHA512
096a9bcbc11803236ce4cd7c6763ca4916d3d51a5487f3bff6c88452c6b503810c67c21adec3e46210b9f5fa42a5c0b8245a7b35186e21eb6550d27579ab7f15
-
SSDEEP
3072:WwPcuvxQ0GN2OG3O1T9/ywvydRqORRTq:pPcqjGfG3O1ZGRqOXTq
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
e5743a0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5743a0.exe -
Processes:
e5743a0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5743a0.exe -
Processes:
e5743a0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5743a0.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 31 IoCs
Processes:
resource yara_rule behavioral2/memory/2284-6-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-21-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-25-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-11-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-31-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-34-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-10-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-36-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-35-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-9-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-8-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-37-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-38-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-39-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-40-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-41-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-43-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-44-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-53-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-55-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-56-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-66-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-68-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-71-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-73-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-75-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-77-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-79-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-81-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-83-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2284-84-0x00000000007F0000-0x00000000018AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 37 IoCs
Processes:
resource yara_rule behavioral2/memory/2284-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2284-6-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-21-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-25-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/3872-32-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2284-11-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-31-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-34-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-10-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-36-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-35-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-9-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-8-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-37-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-38-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-39-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-40-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-41-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-43-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-44-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/4576-52-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/2284-53-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-55-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-56-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-66-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-68-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-71-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-73-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-75-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-77-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-79-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-81-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-83-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-84-0x00000000007F0000-0x00000000018AA000-memory.dmp UPX behavioral2/memory/2284-103-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3872-107-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4576-111-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e5743a0.exee5744c9.exee575f75.exepid process 2284 e5743a0.exe 3872 e5744c9.exe 4576 e575f75.exe -
Processes:
resource yara_rule behavioral2/memory/2284-6-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-21-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-25-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-11-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-31-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-34-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-10-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-36-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-35-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-9-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-8-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-37-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-38-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-39-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-40-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-41-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-43-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-44-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-53-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-55-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-56-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-66-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-68-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-71-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-73-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-75-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-77-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-79-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-81-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-83-0x00000000007F0000-0x00000000018AA000-memory.dmp upx behavioral2/memory/2284-84-0x00000000007F0000-0x00000000018AA000-memory.dmp upx -
Processes:
e5743a0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5743a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5743a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5743a0.exe -
Processes:
e5743a0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5743a0.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e5743a0.exedescription ioc process File opened (read-only) \??\L: e5743a0.exe File opened (read-only) \??\R: e5743a0.exe File opened (read-only) \??\S: e5743a0.exe File opened (read-only) \??\I: e5743a0.exe File opened (read-only) \??\J: e5743a0.exe File opened (read-only) \??\N: e5743a0.exe File opened (read-only) \??\M: e5743a0.exe File opened (read-only) \??\Q: e5743a0.exe File opened (read-only) \??\E: e5743a0.exe File opened (read-only) \??\G: e5743a0.exe File opened (read-only) \??\H: e5743a0.exe File opened (read-only) \??\K: e5743a0.exe File opened (read-only) \??\O: e5743a0.exe File opened (read-only) \??\P: e5743a0.exe -
Drops file in Program Files directory 4 IoCs
Processes:
e5743a0.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e5743a0.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e5743a0.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e5743a0.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e5743a0.exe -
Drops file in Windows directory 2 IoCs
Processes:
e5743a0.exedescription ioc process File created C:\Windows\e5743ee e5743a0.exe File opened for modification C:\Windows\SYSTEM.INI e5743a0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e5743a0.exepid process 2284 e5743a0.exe 2284 e5743a0.exe 2284 e5743a0.exe 2284 e5743a0.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e5743a0.exedescription pid process Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe Token: SeDebugPrivilege 2284 e5743a0.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
rundll32.exerundll32.exee5743a0.exedescription pid process target process PID 1748 wrote to memory of 2128 1748 rundll32.exe rundll32.exe PID 1748 wrote to memory of 2128 1748 rundll32.exe rundll32.exe PID 1748 wrote to memory of 2128 1748 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2284 2128 rundll32.exe e5743a0.exe PID 2128 wrote to memory of 2284 2128 rundll32.exe e5743a0.exe PID 2128 wrote to memory of 2284 2128 rundll32.exe e5743a0.exe PID 2284 wrote to memory of 808 2284 e5743a0.exe fontdrvhost.exe PID 2284 wrote to memory of 816 2284 e5743a0.exe fontdrvhost.exe PID 2284 wrote to memory of 376 2284 e5743a0.exe dwm.exe PID 2284 wrote to memory of 2428 2284 e5743a0.exe sihost.exe PID 2284 wrote to memory of 2464 2284 e5743a0.exe svchost.exe PID 2284 wrote to memory of 2668 2284 e5743a0.exe taskhostw.exe PID 2284 wrote to memory of 3384 2284 e5743a0.exe Explorer.EXE PID 2284 wrote to memory of 3536 2284 e5743a0.exe svchost.exe PID 2284 wrote to memory of 3748 2284 e5743a0.exe DllHost.exe PID 2284 wrote to memory of 3844 2284 e5743a0.exe StartMenuExperienceHost.exe PID 2284 wrote to memory of 3908 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 4000 2284 e5743a0.exe SearchApp.exe PID 2284 wrote to memory of 4144 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 4468 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 2860 2284 e5743a0.exe TextInputHost.exe PID 2284 wrote to memory of 2132 2284 e5743a0.exe backgroundTaskHost.exe PID 2284 wrote to memory of 1748 2284 e5743a0.exe rundll32.exe PID 2284 wrote to memory of 2128 2284 e5743a0.exe rundll32.exe PID 2284 wrote to memory of 2128 2284 e5743a0.exe rundll32.exe PID 2128 wrote to memory of 3872 2128 rundll32.exe e5744c9.exe PID 2128 wrote to memory of 3872 2128 rundll32.exe e5744c9.exe PID 2128 wrote to memory of 3872 2128 rundll32.exe e5744c9.exe PID 2128 wrote to memory of 4576 2128 rundll32.exe e575f75.exe PID 2128 wrote to memory of 4576 2128 rundll32.exe e575f75.exe PID 2128 wrote to memory of 4576 2128 rundll32.exe e575f75.exe PID 2284 wrote to memory of 808 2284 e5743a0.exe fontdrvhost.exe PID 2284 wrote to memory of 816 2284 e5743a0.exe fontdrvhost.exe PID 2284 wrote to memory of 376 2284 e5743a0.exe dwm.exe PID 2284 wrote to memory of 2428 2284 e5743a0.exe sihost.exe PID 2284 wrote to memory of 2464 2284 e5743a0.exe svchost.exe PID 2284 wrote to memory of 2668 2284 e5743a0.exe taskhostw.exe PID 2284 wrote to memory of 3384 2284 e5743a0.exe Explorer.EXE PID 2284 wrote to memory of 3536 2284 e5743a0.exe svchost.exe PID 2284 wrote to memory of 3748 2284 e5743a0.exe DllHost.exe PID 2284 wrote to memory of 3844 2284 e5743a0.exe StartMenuExperienceHost.exe PID 2284 wrote to memory of 3908 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 4000 2284 e5743a0.exe SearchApp.exe PID 2284 wrote to memory of 4144 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 4468 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 2860 2284 e5743a0.exe TextInputHost.exe PID 2284 wrote to memory of 3872 2284 e5743a0.exe e5744c9.exe PID 2284 wrote to memory of 3872 2284 e5743a0.exe e5744c9.exe PID 2284 wrote to memory of 3168 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 3176 2284 e5743a0.exe RuntimeBroker.exe PID 2284 wrote to memory of 4576 2284 e5743a0.exe e575f75.exe PID 2284 wrote to memory of 4576 2284 e5743a0.exe e575f75.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
e5743a0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5743a0.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c7859818c915aa9b5d35f88e9dcd1d51639a3ab54312e61f52807fa443da920.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e5743a0.exeC:\Users\Admin\AppData\Local\Temp\e5743a0.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e5744c9.exeC:\Users\Admin\AppData\Local\Temp\e5744c9.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e575f75.exeC:\Users\Admin\AppData\Local\Temp\e575f75.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e5743a0.exeFilesize
97KB
MD5d43858b39b17c5ca024b5fbfea1fbb2a
SHA1562f9580c85b1d308c5f5e8d5273327262accce1
SHA2567f5e5c450437280aad2b6f492104640ada2b6ae687b5bf8e7494326f3bf83652
SHA512714db1a1c99c0fb9eb0b57e92084ce4199ec3c892f1ecefaa4bb23afc0e5d10b9f1dc4f5b4aeb112612db8f36fa61c36f9c8d2a5802dc67cf3c7f08b46074946
-
memory/2128-14-0x00000000038F0000-0x00000000038F2000-memory.dmpFilesize
8KB
-
memory/2128-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2128-12-0x00000000038F0000-0x00000000038F2000-memory.dmpFilesize
8KB
-
memory/2128-27-0x00000000038F0000-0x00000000038F2000-memory.dmpFilesize
8KB
-
memory/2128-26-0x0000000003980000-0x0000000003981000-memory.dmpFilesize
4KB
-
memory/2284-41-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-68-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-33-0x0000000003520000-0x0000000003522000-memory.dmpFilesize
8KB
-
memory/2284-103-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2284-11-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-28-0x0000000003520000-0x0000000003522000-memory.dmpFilesize
8KB
-
memory/2284-31-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-34-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-10-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-36-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-35-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-16-0x0000000003D30000-0x0000000003D31000-memory.dmpFilesize
4KB
-
memory/2284-21-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-6-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-9-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-8-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-37-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-38-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-39-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-40-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2284-43-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-44-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-91-0x0000000003520000-0x0000000003522000-memory.dmpFilesize
8KB
-
memory/2284-53-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-55-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-56-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-84-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-83-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-81-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-79-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-77-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-75-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-66-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-25-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-71-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/2284-73-0x00000000007F0000-0x00000000018AA000-memory.dmpFilesize
16.7MB
-
memory/3872-59-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3872-60-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3872-64-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3872-32-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3872-107-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4576-62-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4576-63-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4576-65-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4576-52-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4576-111-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB