Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe
Resource
win7-20240704-en
General
-
Target
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe
-
Size
567KB
-
MD5
c00c2c86cac8aec9dc53d73e6addf621
-
SHA1
c1d177cb32b1beb3a09827d59541c19fc473ce65
-
SHA256
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067
-
SHA512
caef8e4d387d4912103e523b184c0b9b823b5658877a02de52fc944fb30ca22c8681b00bb2e6b23b8513b9e1f52df2ae83dcde41607d89855ef67539e37b7ab9
-
SSDEEP
6144:wFpbFpXFpgT2Jst3mWmqLuFpguM2cT65Qv4sdZfUmkjYtK3Qxahx:Wpxp1pwsWUpRh5u4ccm8++x
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe -
Deletes itself 1 IoCs
pid Process 2420 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2432 Logo1_.exe 2312 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 2648 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe -
Loads dropped DLL 4 IoCs
pid Process 2420 cmd.exe 2420 cmd.exe 2176 cmd.exe 2176 cmd.exe -
resource yara_rule behavioral1/memory/2312-41-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-54-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-44-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-43-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-42-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-40-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-39-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-36-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-35-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-37-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2312-33-0x0000000000990000-0x0000000001A4A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\f76acf2 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe File opened for modification C:\Windows\SYSTEM.INI f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe File opened for modification C:\Windows\rundl132.exe f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe File created C:\Windows\Logo1_.exe f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe File created C:\Windows\Logo1_.exe f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe 2432 Logo1_.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2420 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 28 PID 3052 wrote to memory of 2420 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 28 PID 3052 wrote to memory of 2420 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 28 PID 3052 wrote to memory of 2420 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 28 PID 3052 wrote to memory of 2432 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 29 PID 3052 wrote to memory of 2432 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 29 PID 3052 wrote to memory of 2432 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 29 PID 3052 wrote to memory of 2432 3052 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 29 PID 2432 wrote to memory of 2288 2432 Logo1_.exe 30 PID 2432 wrote to memory of 2288 2432 Logo1_.exe 30 PID 2432 wrote to memory of 2288 2432 Logo1_.exe 30 PID 2432 wrote to memory of 2288 2432 Logo1_.exe 30 PID 2288 wrote to memory of 1432 2288 net.exe 33 PID 2288 wrote to memory of 1432 2288 net.exe 33 PID 2288 wrote to memory of 1432 2288 net.exe 33 PID 2288 wrote to memory of 1432 2288 net.exe 33 PID 2420 wrote to memory of 2312 2420 cmd.exe 34 PID 2420 wrote to memory of 2312 2420 cmd.exe 34 PID 2420 wrote to memory of 2312 2420 cmd.exe 34 PID 2420 wrote to memory of 2312 2420 cmd.exe 34 PID 2312 wrote to memory of 2176 2312 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 35 PID 2312 wrote to memory of 2176 2312 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 35 PID 2312 wrote to memory of 2176 2312 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 35 PID 2312 wrote to memory of 2176 2312 f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe 35 PID 2432 wrote to memory of 1180 2432 Logo1_.exe 21 PID 2432 wrote to memory of 1180 2432 Logo1_.exe 21 PID 2176 wrote to memory of 2648 2176 cmd.exe 37 PID 2176 wrote to memory of 2648 2176 cmd.exe 37 PID 2176 wrote to memory of 2648 2176 cmd.exe 37 PID 2176 wrote to memory of 2648 2176 cmd.exe 37 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe"C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aABBA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe"C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aAD21.bat5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe"C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe"6⤵
- Executes dropped EXE
PID:2648
-
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1432
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD53b6ab73ad7d6d27bbc1f2b09b6a7a13a
SHA1a9adb49e14c018f19837e90e2d5cd930cd3c8d40
SHA256996c71e8a6f399e7895e24bb031067770cad117cd9569743244ba32c97a310f8
SHA512ce509a807c60da7faa8c579f0228195334decf42787fc578e384a6d77e10ba17d7e2f5781ac75578b31278612587a48bdd8d5c8e93481c0dc4376a0d41ef5ed9
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5c02ffb817dff4f854dc9f663bff91f26
SHA1fb21983dca669fd07d35cb7b76ae829645b91e59
SHA2561b14d0c76dcee81364f4e016700cadb91978b5c0d8cdcaafe02d073cbff82389
SHA512a095763f5b44c8bb7dabfdff56eb650db7b57994da963ab2b250f5177266589cc4acc0110df267ee8fd9e158e58c50f6cfec163472019e485affdc320cbb5c0b
-
Filesize
722B
MD5dbc82159c80129f3fa10797abefeff71
SHA1998e542464ff6c1fe93a6adceadc535e02c34c5f
SHA2569c67b87fa7b8bea3c9f995680afb599a62696a1780d9dbcad9d69873a9604740
SHA51200f8673c12ddb12820d8a7dd44ae71ba3c4b24d5cf3335bed6678039f5b4d949d36e8d5459ca5d50e2d5daea34247552811a94a2411598399d0cceb54c52afd3
-
C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe.exe
Filesize540KB
MD50bb681b15cac98f7686ebd583f10f23e
SHA1deec2aee6a0c53843a5ecfb602877d701ff093a2
SHA25641b57f8f2e4a3ec95b1ded89a9b58ab8188759eaddb7dae7e359014f31af99ae
SHA512b341a69de25810043f509955129879dfceafdca94fd2f5af0adece17cea0b3c9220caf6c5f830b664ba456248e67001076a0f9edd1480b9027da7385d8067256
-
C:\Users\Admin\AppData\Local\Temp\f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe.exe
Filesize513KB
MD5099b98033eba20ddc97a8854deccd932
SHA1645bb6959840331826a77f1ab19d1484da84c68e
SHA2562e70f2cb5d36fb9d3de990b4428a872213e543a85cf5f983d975281a9a56ee5f
SHA5123cac6c8727eda8c7ec2339a404566cef3354f023e7115d44d5034c6abf193287f4de96ca6289bb854396341faab809c7b7bc950f0d8b63062a6072af211ec831
-
Filesize
27KB
MD5faa537da04333b1d2264b5e74336142e
SHA18ac278558286edcbe5b0648d0052dc98e148aa40
SHA2569c1055873c600ca7e5e6d55aff2bc1287d91b6e7e7dd73af40175e27cdc8c131
SHA51291ba1be7a655d818e3ba62c5bb1c023ce19e5105a5d1b798d9da1faf6dded3c0ea4507617ed56dbf911f2a235547f02f4ecf1fd353e0451ea0870eb6605f2dd1
-
Filesize
27KB
MD5dafa3c7445c5f0485d4fc4777401419d
SHA1ee8f93641875cc64e35ad39c7aa56dd30d674f36
SHA256389ccb5e5a91f6f9145404b1675c4ff9fd3f4b9d7224a1939c4304f4accdb2c2
SHA51222c88cba4d1cf3c63f143797f0bf4536f2a2bee9f6fc761d549d4ebd034630f2e4556b0742f760dfc9f104ca1b0864d499c617d91fe6a43f27c4e3564e2a0c0a
-
Filesize
9B
MD52efce5174bcf8d378a924333f75e26ad
SHA14fe6e1d729b55d42eb9d74aca11b36a94402de14
SHA25604ccb9bec2864153c72852867d8e65dca07eca4e5edcfb4beb62cb364dcd91fa
SHA51224684969632fb0562a3a7a5fec91d869d627730d8e9d83a2b17e326d7047e3fbff205eec207914e42ecd50fef68a212c19f3599ded271c00e66acc22f1f04c16