Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
dil.exe
Resource
win7-20240508-en
General
-
Target
dil.exe
-
Size
104KB
-
MD5
1c4eae5ef3e10ce0676618418ea9ed65
-
SHA1
26e7f992746b0e9b783d360c8cf9e475bd1ce015
-
SHA256
b9c3adeb63e6be94b581a68b3b675737501283db663484bfc7e14bdecfc7e940
-
SHA512
d459f72f5403941a7c1666dc91911446ac608faba8cae0a44ab8a2324536ed8db25f5a8c9e80cfcffd09df61a541ba181f94545404e62cf23f5e67e896bc2645
-
SSDEEP
1536:sKSowsA2YQWZzF90K/m2eMJN6tOwSDW7tyQPjccFl3kvQhMuJlAGGk/l:s1JsACe3uNM6tXb7tyOjtb3OQrEDW
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" dil.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" dil.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" dil.exe -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dil.exe -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" dil.exe -
Processes:
resource yara_rule behavioral2/memory/1672-1-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-8-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-7-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-12-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-9-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-5-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-13-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-3-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-6-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-16-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-17-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-18-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-19-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-20-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-22-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-23-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-24-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-26-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-27-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-29-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-31-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-33-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-35-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-37-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-39-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-40-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-42-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-44-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-45-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-51-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-54-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-55-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-58-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-59-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-60-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-61-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-62-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-64-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-67-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-69-0x0000000002190000-0x000000000321E000-memory.dmp upx behavioral2/memory/1672-70-0x0000000002190000-0x000000000321E000-memory.dmp upx -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" dil.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dil.exe -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dil.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dil.exedescription ioc process File opened (read-only) \??\E: dil.exe File opened (read-only) \??\G: dil.exe File opened (read-only) \??\I: dil.exe File opened (read-only) \??\O: dil.exe File opened (read-only) \??\Q: dil.exe File opened (read-only) \??\W: dil.exe File opened (read-only) \??\H: dil.exe File opened (read-only) \??\K: dil.exe File opened (read-only) \??\M: dil.exe File opened (read-only) \??\N: dil.exe File opened (read-only) \??\P: dil.exe File opened (read-only) \??\R: dil.exe File opened (read-only) \??\V: dil.exe File opened (read-only) \??\Z: dil.exe File opened (read-only) \??\J: dil.exe File opened (read-only) \??\S: dil.exe File opened (read-only) \??\X: dil.exe File opened (read-only) \??\L: dil.exe File opened (read-only) \??\T: dil.exe File opened (read-only) \??\U: dil.exe File opened (read-only) \??\Y: dil.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
dil.exedescription ioc process File opened for modification C:\autorun.inf dil.exe File opened for modification F:\autorun.inf dil.exe -
Drops file in Program Files directory 12 IoCs
Processes:
dil.exedescription ioc process File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe dil.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe dil.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe dil.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe dil.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe dil.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe dil.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe dil.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe dil.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe dil.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe dil.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe dil.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe dil.exe -
Drops file in Windows directory 1 IoCs
Processes:
dil.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI dil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
dil.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings dil.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
dil.exepid process 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe 1672 dil.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
dil.exedescription pid process Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe Token: SeDebugPrivilege 1672 dil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dil.exedescription pid process target process PID 1672 wrote to memory of 788 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 796 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 60 1672 dil.exe dwm.exe PID 1672 wrote to memory of 2644 1672 dil.exe sihost.exe PID 1672 wrote to memory of 2748 1672 dil.exe svchost.exe PID 1672 wrote to memory of 2968 1672 dil.exe taskhostw.exe PID 1672 wrote to memory of 3420 1672 dil.exe Explorer.EXE PID 1672 wrote to memory of 3560 1672 dil.exe svchost.exe PID 1672 wrote to memory of 3752 1672 dil.exe DllHost.exe PID 1672 wrote to memory of 3876 1672 dil.exe StartMenuExperienceHost.exe PID 1672 wrote to memory of 3960 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4036 1672 dil.exe SearchApp.exe PID 1672 wrote to memory of 3844 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4616 1672 dil.exe TextInputHost.exe PID 1672 wrote to memory of 4380 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 788 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 796 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 60 1672 dil.exe dwm.exe PID 1672 wrote to memory of 2644 1672 dil.exe sihost.exe PID 1672 wrote to memory of 2748 1672 dil.exe svchost.exe PID 1672 wrote to memory of 2968 1672 dil.exe taskhostw.exe PID 1672 wrote to memory of 3420 1672 dil.exe Explorer.EXE PID 1672 wrote to memory of 3560 1672 dil.exe svchost.exe PID 1672 wrote to memory of 3752 1672 dil.exe DllHost.exe PID 1672 wrote to memory of 3876 1672 dil.exe StartMenuExperienceHost.exe PID 1672 wrote to memory of 3960 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4036 1672 dil.exe SearchApp.exe PID 1672 wrote to memory of 3844 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4616 1672 dil.exe TextInputHost.exe PID 1672 wrote to memory of 4380 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 788 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 796 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 60 1672 dil.exe dwm.exe PID 1672 wrote to memory of 2644 1672 dil.exe sihost.exe PID 1672 wrote to memory of 2748 1672 dil.exe svchost.exe PID 1672 wrote to memory of 2968 1672 dil.exe taskhostw.exe PID 1672 wrote to memory of 3420 1672 dil.exe Explorer.EXE PID 1672 wrote to memory of 3560 1672 dil.exe svchost.exe PID 1672 wrote to memory of 3752 1672 dil.exe DllHost.exe PID 1672 wrote to memory of 3876 1672 dil.exe StartMenuExperienceHost.exe PID 1672 wrote to memory of 3960 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4036 1672 dil.exe SearchApp.exe PID 1672 wrote to memory of 3844 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4616 1672 dil.exe TextInputHost.exe PID 1672 wrote to memory of 4380 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 788 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 796 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 60 1672 dil.exe dwm.exe PID 1672 wrote to memory of 2644 1672 dil.exe sihost.exe PID 1672 wrote to memory of 2748 1672 dil.exe svchost.exe PID 1672 wrote to memory of 2968 1672 dil.exe taskhostw.exe PID 1672 wrote to memory of 3420 1672 dil.exe Explorer.EXE PID 1672 wrote to memory of 3560 1672 dil.exe svchost.exe PID 1672 wrote to memory of 3752 1672 dil.exe DllHost.exe PID 1672 wrote to memory of 3876 1672 dil.exe StartMenuExperienceHost.exe PID 1672 wrote to memory of 3960 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4036 1672 dil.exe SearchApp.exe PID 1672 wrote to memory of 3844 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 4616 1672 dil.exe TextInputHost.exe PID 1672 wrote to memory of 4380 1672 dil.exe RuntimeBroker.exe PID 1672 wrote to memory of 788 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 796 1672 dil.exe fontdrvhost.exe PID 1672 wrote to memory of 60 1672 dil.exe dwm.exe PID 1672 wrote to memory of 2644 1672 dil.exe sihost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dil.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\dil.exe"C:\Users\Admin\AppData\Local\Temp\dil.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\slpm.exeFilesize
100KB
MD533a3f9158599153d387e1bbe2018f4b8
SHA10bb34212d4f0eb8f30aee8af67fb8391c0ace343
SHA25644f546a034fcea930761d319daf23f6b2230d920e53919b6c2536a98ccf959f9
SHA512ae6ce4b50144c6be44f2f9f5a79fe4df0e2dfed801af30e712f8ea9ad389a4a68419957f8d4de24b55f0e17e78439664c3a88c0d4014ba005a96630aaeb84448
-
memory/1672-29-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-64-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-7-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-14-0x0000000003270000-0x0000000003272000-memory.dmpFilesize
8KB
-
memory/1672-15-0x0000000003270000-0x0000000003272000-memory.dmpFilesize
8KB
-
memory/1672-12-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-9-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-5-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-11-0x0000000004110000-0x0000000004111000-memory.dmpFilesize
4KB
-
memory/1672-10-0x0000000003270000-0x0000000003272000-memory.dmpFilesize
8KB
-
memory/1672-13-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-3-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-6-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-16-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-17-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-18-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-19-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-20-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-22-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-23-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-24-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-26-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-70-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-8-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-37-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-33-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-35-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-31-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-39-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-40-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-42-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-44-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-45-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-51-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-54-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-55-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-58-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-59-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-60-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-61-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-62-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-0-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1672-67-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-68-0x0000000003270000-0x0000000003272000-memory.dmpFilesize
8KB
-
memory/1672-69-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-27-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB
-
memory/1672-1-0x0000000002190000-0x000000000321E000-memory.dmpFilesize
16.6MB