Malware Analysis Report

2024-09-11 12:21

Sample ID 240614-krm8ksxarl
Target b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c
SHA256 b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c
Tags
sality backdoor evasion trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c

Threat Level: Known bad

The file b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c was found to be: Known bad.

Malicious Activity Summary

sality backdoor evasion trojan upx

Modifies firewall policy service

UAC bypass

Windows security bypass

Sality

Windows security modification

Executes dropped EXE

UPX packed file

Checks whether UAC is enabled

Enumerates connected drives

Drops autorun.inf file

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

System policy modification

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 08:50

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 08:50

Reported

2024-06-14 08:52

Platform

win7-20240508-en

Max time kernel

122s

Max time network

121s

Command Line

"taskhost.exe"

Signatures

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Sality

backdoor sality

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification C:\autorun.inf C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification F:\autorun.inf C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\SYSTEM.INI C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\DllHost.exe
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 1920 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhost.exe
PID 1920 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\Dwm.exe
PID 1920 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Processes

C:\Windows\system32\taskhost.exe

"taskhost.exe"

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe

"C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe"

Network

N/A

Files

memory/1920-0-0x0000000000400000-0x0000000000627000-memory.dmp

memory/1920-2-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-8-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-4-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-5-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-22-0x0000000005960000-0x0000000005961000-memory.dmp

memory/1920-26-0x0000000005810000-0x0000000005812000-memory.dmp

memory/1920-27-0x0000000005810000-0x0000000005812000-memory.dmp

memory/1920-10-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-25-0x0000000005960000-0x0000000005961000-memory.dmp

memory/1920-6-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-21-0x0000000005810000-0x0000000005812000-memory.dmp

memory/1072-12-0x0000000000210000-0x0000000000212000-memory.dmp

memory/1920-11-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-9-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-7-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-28-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-29-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-30-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-32-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-31-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-34-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-35-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-37-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-38-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-40-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-42-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-50-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-51-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-55-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-56-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-58-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-61-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-67-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-69-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-71-0x0000000002090000-0x000000000311E000-memory.dmp

memory/1920-87-0x0000000005810000-0x0000000005812000-memory.dmp

C:\jakqqd.exe

MD5 524574205099fdfd1e75031a4a919e05
SHA1 b69ab404e4aef7ae61f1cafa43e94b039350bd8f
SHA256 51842498f72e93fa43d1ecf30a6425406f13ed367cb2a307e8b0bca024f91e02
SHA512 da1653f1d15c206555fef63a98396727c036c1349d2e5af8080a1b3ed269ae6fe595eb279fc8a3d3d2fb346e08fb4974297f8b3472792175237d101fdd088db0

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 08:50

Reported

2024-06-14 08:52

Platform

win10v2004-20240226-en

Max time kernel

137s

Max time network

160s

Command Line

"fontdrvhost.exe"

Signatures

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Sality

backdoor sality

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification F:\autorun.inf C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\autorun.inf C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\SYSTEM.INI C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3192 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\fontdrvhost.exe
PID 3192 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\fontdrvhost.exe
PID 3192 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\dwm.exe
PID 3192 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\sihost.exe
PID 3192 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\svchost.exe
PID 3192 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhostw.exe
PID 3192 wrote to memory of 3296 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 3192 wrote to memory of 3520 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\svchost.exe
PID 3192 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\DllHost.exe
PID 3192 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 3192 wrote to memory of 3972 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 3192 wrote to memory of 3864 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
PID 3192 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 824 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 4260 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 5048 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\fontdrvhost.exe
PID 3192 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\fontdrvhost.exe
PID 3192 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\dwm.exe
PID 3192 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\sihost.exe
PID 3192 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\svchost.exe
PID 3192 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhostw.exe
PID 3192 wrote to memory of 3296 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 3192 wrote to memory of 3520 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\svchost.exe
PID 3192 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\DllHost.exe
PID 3192 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 3192 wrote to memory of 3972 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 3192 wrote to memory of 3864 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
PID 3192 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 824 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 4260 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 5048 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\fontdrvhost.exe
PID 3192 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\fontdrvhost.exe
PID 3192 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\dwm.exe
PID 3192 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\sihost.exe
PID 3192 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\svchost.exe
PID 3192 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\taskhostw.exe
PID 3192 wrote to memory of 3296 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\Explorer.EXE
PID 3192 wrote to memory of 3520 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\svchost.exe
PID 3192 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\system32\DllHost.exe
PID 3192 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 3192 wrote to memory of 3972 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 3192 wrote to memory of 3864 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\System32\RuntimeBroker.exe
PID 3192 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
PID 3192 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 824 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3192 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe N/A

Processes

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\dwm.exe

"dwm.exe"

C:\Windows\system32\sihost.exe

sihost.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc

C:\Windows\system32\taskhostw.exe

taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe

"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe

"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe

"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ffece862e98,0x7ffece862ea4,0x7ffece862eb0

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2400 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3276 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3380 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5288 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5500 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:1

C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe

"C:\Users\Admin\AppData\Local\Temp\b531d73ba9f2af2017414292af9ee6a6983505566af9b37101a52d3eed131f7c.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4052 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

memory/3192-0-0x0000000000400000-0x0000000000627000-memory.dmp

memory/3192-1-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-3-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-5-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-7-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-10-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-9-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-8-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-6-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-13-0x0000000005C20000-0x0000000005C22000-memory.dmp

memory/3192-12-0x0000000005D70000-0x0000000005D71000-memory.dmp

memory/3192-11-0x0000000005C20000-0x0000000005C22000-memory.dmp

memory/3192-4-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-14-0x0000000005C20000-0x0000000005C22000-memory.dmp

memory/3192-15-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-16-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-17-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-18-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-19-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-21-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-22-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-23-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-25-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-26-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-28-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-30-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-33-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-36-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-37-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-39-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-41-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-43-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-45-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-47-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-49-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-56-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-57-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-58-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-60-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-62-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-64-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-66-0x0000000002550000-0x00000000035DE000-memory.dmp

memory/3192-68-0x0000000005C20000-0x0000000005C22000-memory.dmp

memory/3192-69-0x0000000002550000-0x00000000035DE000-memory.dmp

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

MD5 faf79a48399d502194e87a5ad1ba7b8e
SHA1 09cd9d783ac126d33ec37de781beedce9ce6aa51
SHA256 3d1266025af95bdb7b92d17debbf88a1386b19b7f7c2eeb9ced77debb9748e14
SHA512 d84f8e25179e2cee6f95dc95c94a4a70dc56814aaf7f95e38f24f9828e64629cab0c184f5fddd67d834f419703f65d9d0e3a93e54d2730ed63d3d89644babb84

F:\acvbb.pif

MD5 64490b18697ddc041afbfffd109fb889
SHA1 210613b27941ee1341ae51a8f156049189c56f99
SHA256 19d57a8adb35e8991673a646f6621b6be77d6d863f5a15d7a8b2147f9ae4fa76
SHA512 9c7e44f67389c5696ec463a65e826bae6cabe87d5c4df4f33d8b8cc5536ee92cc672cf51ac1130647c85edde4e6e0d04bc8b6264debdfd55ab634743c9e0fdd4