Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
484ef377a8a3a666c5360bc148cfaf3307b069a99c1cfffd9035144ff84b49ff.dll
Resource
win7-20240508-en
General
-
Target
484ef377a8a3a666c5360bc148cfaf3307b069a99c1cfffd9035144ff84b49ff.dll
-
Size
120KB
-
MD5
46b6b81f6ec8f07cd6850953e821d420
-
SHA1
ff98e012af1135db898161c216a3771f15230600
-
SHA256
484ef377a8a3a666c5360bc148cfaf3307b069a99c1cfffd9035144ff84b49ff
-
SHA512
172e5d2bf8c7be4e52af2d06ece1dd09746dde26bc38601c4276269b3d1a37defa7a5efacd663b8b4c0e7edd4238ad6a52ae356997914e2034f41f2e557977ea
-
SSDEEP
1536:pep5Dr4QaPCD1yCcVGvTePBeSN67H6tfnfGhkPqHmZUZupQ3r5z:kHYCDMujU8HynOhkmZupG5z
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
e580c20.exee57dfc1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e580c20.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e580c20.exe -
Processes:
e57dfc1.exee580c20.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e580c20.exe -
Processes:
e57dfc1.exee580c20.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e580c20.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 28 IoCs
Processes:
resource yara_rule behavioral2/memory/3212-6-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-11-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-10-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-12-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-27-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-9-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-8-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-33-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-31-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-34-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-36-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-37-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-38-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-39-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-40-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-46-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-59-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-60-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-62-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-63-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-65-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-66-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-69-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-71-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-72-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3212-77-0x0000000000820000-0x00000000018DA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4844-112-0x00000000007D0000-0x000000000188A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4844-156-0x00000000007D0000-0x000000000188A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3212-6-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-11-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-10-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-12-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-27-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-9-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-8-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-33-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-31-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-34-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-36-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-37-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-38-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-39-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-40-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-46-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/4844-51-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/3212-59-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-60-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-62-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-63-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-65-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-66-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-69-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-71-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-72-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-77-0x0000000000820000-0x00000000018DA000-memory.dmp UPX behavioral2/memory/3212-92-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/1036-96-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4844-112-0x00000000007D0000-0x000000000188A000-memory.dmp UPX behavioral2/memory/4844-157-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4844-156-0x00000000007D0000-0x000000000188A000-memory.dmp UPX behavioral2/memory/3916-155-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
e57dfc1.exee57e119.exee580c20.exee580c7e.exepid process 3212 e57dfc1.exe 1036 e57e119.exe 4844 e580c20.exe 3916 e580c7e.exe -
Processes:
resource yara_rule behavioral2/memory/3212-6-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-11-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-10-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-12-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-27-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-9-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-8-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-33-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-31-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-34-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-36-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-37-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-38-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-39-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-40-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-46-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-59-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-60-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-62-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-63-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-65-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-66-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-69-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-71-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-72-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3212-77-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/4844-112-0x00000000007D0000-0x000000000188A000-memory.dmp upx behavioral2/memory/4844-156-0x00000000007D0000-0x000000000188A000-memory.dmp upx -
Processes:
e57dfc1.exee580c20.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e57dfc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e580c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e580c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e580c20.exe -
Processes:
e57dfc1.exee580c20.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e580c20.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e57dfc1.exee580c20.exedescription ioc process File opened (read-only) \??\M: e57dfc1.exe File opened (read-only) \??\N: e57dfc1.exe File opened (read-only) \??\H: e57dfc1.exe File opened (read-only) \??\I: e57dfc1.exe File opened (read-only) \??\I: e580c20.exe File opened (read-only) \??\J: e57dfc1.exe File opened (read-only) \??\K: e57dfc1.exe File opened (read-only) \??\G: e580c20.exe File opened (read-only) \??\E: e57dfc1.exe File opened (read-only) \??\G: e57dfc1.exe File opened (read-only) \??\H: e580c20.exe File opened (read-only) \??\J: e580c20.exe File opened (read-only) \??\L: e57dfc1.exe File opened (read-only) \??\E: e580c20.exe -
Drops file in Program Files directory 3 IoCs
Processes:
e57dfc1.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e57dfc1.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e57dfc1.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e57dfc1.exe -
Drops file in Windows directory 3 IoCs
Processes:
e57dfc1.exee580c20.exedescription ioc process File created C:\Windows\e57e04e e57dfc1.exe File opened for modification C:\Windows\SYSTEM.INI e57dfc1.exe File created C:\Windows\e5833ad e580c20.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e57dfc1.exee580c20.exepid process 3212 e57dfc1.exe 3212 e57dfc1.exe 3212 e57dfc1.exe 3212 e57dfc1.exe 4844 e580c20.exe 4844 e580c20.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e57dfc1.exedescription pid process Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe Token: SeDebugPrivilege 3212 e57dfc1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exee57dfc1.exedescription pid process target process PID 212 wrote to memory of 3592 212 rundll32.exe rundll32.exe PID 212 wrote to memory of 3592 212 rundll32.exe rundll32.exe PID 212 wrote to memory of 3592 212 rundll32.exe rundll32.exe PID 3592 wrote to memory of 3212 3592 rundll32.exe e57dfc1.exe PID 3592 wrote to memory of 3212 3592 rundll32.exe e57dfc1.exe PID 3592 wrote to memory of 3212 3592 rundll32.exe e57dfc1.exe PID 3212 wrote to memory of 784 3212 e57dfc1.exe fontdrvhost.exe PID 3212 wrote to memory of 792 3212 e57dfc1.exe fontdrvhost.exe PID 3212 wrote to memory of 64 3212 e57dfc1.exe dwm.exe PID 3212 wrote to memory of 2604 3212 e57dfc1.exe sihost.exe PID 3212 wrote to memory of 2664 3212 e57dfc1.exe svchost.exe PID 3212 wrote to memory of 2780 3212 e57dfc1.exe taskhostw.exe PID 3212 wrote to memory of 3476 3212 e57dfc1.exe Explorer.EXE PID 3212 wrote to memory of 3600 3212 e57dfc1.exe svchost.exe PID 3212 wrote to memory of 3800 3212 e57dfc1.exe DllHost.exe PID 3212 wrote to memory of 3892 3212 e57dfc1.exe StartMenuExperienceHost.exe PID 3212 wrote to memory of 3956 3212 e57dfc1.exe RuntimeBroker.exe PID 3212 wrote to memory of 4044 3212 e57dfc1.exe SearchApp.exe PID 3212 wrote to memory of 3492 3212 e57dfc1.exe RuntimeBroker.exe PID 3212 wrote to memory of 4428 3212 e57dfc1.exe RuntimeBroker.exe PID 3212 wrote to memory of 2256 3212 e57dfc1.exe TextInputHost.exe PID 3212 wrote to memory of 4672 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 3948 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 1924 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 3088 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 2092 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 5092 3212 e57dfc1.exe backgroundTaskHost.exe PID 3212 wrote to memory of 212 3212 e57dfc1.exe rundll32.exe PID 3212 wrote to memory of 3592 3212 e57dfc1.exe rundll32.exe PID 3212 wrote to memory of 3592 3212 e57dfc1.exe rundll32.exe PID 3592 wrote to memory of 1036 3592 rundll32.exe e57e119.exe PID 3592 wrote to memory of 1036 3592 rundll32.exe e57e119.exe PID 3592 wrote to memory of 1036 3592 rundll32.exe e57e119.exe PID 3212 wrote to memory of 784 3212 e57dfc1.exe fontdrvhost.exe PID 3212 wrote to memory of 792 3212 e57dfc1.exe fontdrvhost.exe PID 3212 wrote to memory of 64 3212 e57dfc1.exe dwm.exe PID 3212 wrote to memory of 2604 3212 e57dfc1.exe sihost.exe PID 3212 wrote to memory of 2664 3212 e57dfc1.exe svchost.exe PID 3212 wrote to memory of 2780 3212 e57dfc1.exe taskhostw.exe PID 3212 wrote to memory of 3476 3212 e57dfc1.exe Explorer.EXE PID 3212 wrote to memory of 3600 3212 e57dfc1.exe svchost.exe PID 3212 wrote to memory of 3800 3212 e57dfc1.exe DllHost.exe PID 3212 wrote to memory of 3892 3212 e57dfc1.exe StartMenuExperienceHost.exe PID 3212 wrote to memory of 3956 3212 e57dfc1.exe RuntimeBroker.exe PID 3212 wrote to memory of 4044 3212 e57dfc1.exe SearchApp.exe PID 3212 wrote to memory of 3492 3212 e57dfc1.exe RuntimeBroker.exe PID 3212 wrote to memory of 4428 3212 e57dfc1.exe RuntimeBroker.exe PID 3212 wrote to memory of 2256 3212 e57dfc1.exe TextInputHost.exe PID 3212 wrote to memory of 4672 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 3948 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 1924 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 3088 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 2092 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 5092 3212 e57dfc1.exe backgroundTaskHost.exe PID 3212 wrote to memory of 212 3212 e57dfc1.exe rundll32.exe PID 3212 wrote to memory of 1036 3212 e57dfc1.exe e57e119.exe PID 3212 wrote to memory of 1036 3212 e57dfc1.exe e57e119.exe PID 3212 wrote to memory of 2568 3212 e57dfc1.exe msedge.exe PID 3212 wrote to memory of 4376 3212 e57dfc1.exe RuntimeBroker.exe PID 3212 wrote to memory of 116 3212 e57dfc1.exe RuntimeBroker.exe PID 3592 wrote to memory of 4844 3592 rundll32.exe e580c20.exe PID 3592 wrote to memory of 4844 3592 rundll32.exe e580c20.exe PID 3592 wrote to memory of 4844 3592 rundll32.exe e580c20.exe PID 3592 wrote to memory of 3916 3592 rundll32.exe e580c7e.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e57dfc1.exee580c20.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e57dfc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e580c20.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\484ef377a8a3a666c5360bc148cfaf3307b069a99c1cfffd9035144ff84b49ff.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\484ef377a8a3a666c5360bc148cfaf3307b069a99c1cfffd9035144ff84b49ff.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e57dfc1.exeC:\Users\Admin\AppData\Local\Temp\e57dfc1.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e57e119.exeC:\Users\Admin\AppData\Local\Temp\e57e119.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e580c20.exeC:\Users\Admin\AppData\Local\Temp\e580c20.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e580c7e.exeC:\Users\Admin\AppData\Local\Temp\e580c7e.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffd9946ceb8,0x7ffd9946cec4,0x7ffd9946ced02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2296,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2400,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=3420 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4612,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=1304 /prefetch:82⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e57dfc1.exeFilesize
97KB
MD55b1ac9ee9515ff6c1d25337cfd1daea8
SHA14757bbfe5fc033c6e359f58930404dff9cfbc0a9
SHA256e1e1f9df2c2f3f40895633ff00b9d91fa26aa811f00c14918456c19921d5077b
SHA512288bfaf6387dbb48c69328eae412d2318d9a13637e5a41538a83dccaf9c1039b2fb32a19f2730af39071ae3dc210623ca1842bf8018cfa43e745e47d62980222
-
C:\Windows\SYSTEM.INIFilesize
257B
MD550116709c013a768e7b305ab53e5b9d0
SHA1e6ec6c0871ed9fa2abab50e06defb4b4e78fae57
SHA2564db5b8d45ac24997729abcecaa679d42616a31dc1d3af7abd2a6956836ed11ba
SHA5122ebceffa89cee25b32eacf23f4ca48d28bfb16480535a6e7fcff51444a3585ca56b0dcf2358799ea8d8d1057d20cb3d94371489f3c3f479c53f8e9bb525b0c8f
-
memory/1036-43-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1036-96-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1036-45-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/1036-44-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/3212-66-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-11-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-27-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-30-0x0000000003660000-0x0000000003662000-memory.dmpFilesize
8KB
-
memory/3212-28-0x0000000003660000-0x0000000003662000-memory.dmpFilesize
8KB
-
memory/3212-4-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3212-92-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3212-77-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-16-0x0000000003D30000-0x0000000003D31000-memory.dmpFilesize
4KB
-
memory/3212-9-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-8-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-33-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-31-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-34-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-36-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-37-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-38-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-39-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-40-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-84-0x0000000003660000-0x0000000003662000-memory.dmpFilesize
8KB
-
memory/3212-10-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-12-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-46-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-72-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-71-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-59-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-60-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-62-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-63-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-65-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-6-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3212-69-0x0000000000820000-0x00000000018DA000-memory.dmpFilesize
16.7MB
-
memory/3592-56-0x0000000000B00000-0x0000000000B02000-memory.dmpFilesize
8KB
-
memory/3592-26-0x0000000000B00000-0x0000000000B02000-memory.dmpFilesize
8KB
-
memory/3592-13-0x0000000000B00000-0x0000000000B02000-memory.dmpFilesize
8KB
-
memory/3592-19-0x0000000000B00000-0x0000000000B02000-memory.dmpFilesize
8KB
-
memory/3592-25-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/3592-3-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3916-155-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4844-51-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4844-112-0x00000000007D0000-0x000000000188A000-memory.dmpFilesize
16.7MB
-
memory/4844-157-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4844-156-0x00000000007D0000-0x000000000188A000-memory.dmpFilesize
16.7MB