Analysis
-
max time kernel
99s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:53
Behavioral task
behavioral1
Sample
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe
Resource
win10v2004-20241007-en
General
-
Target
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe
-
Size
570KB
-
MD5
4767f83ca3ff9905cf4dcac847630e50
-
SHA1
f9f14f1c80643ca3d7317a7c02c06a9c0bcfa18d
-
SHA256
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9
-
SHA512
0547c48f60bc64f1fc4c96c51e657e09d7b89453c81cdd07f46fd06c37895c67b4156c3bfabc4c67b52e714dbc76fc98e34382063029151a724bf3ee1a2ad24c
-
SSDEEP
12288:WCLNPL2KestvAeMUbhJlHrfrIf74NCpfUo9ExtytEwEh:WC1L2U5AGLrIf0YExwtmh
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
Processes:
resource yara_rule behavioral2/files/0x0006000000020237-17.dat family_neshta behavioral2/memory/3860-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3860-116-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3860-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Executes dropped EXE 1 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exepid Process 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Processes:
resource yara_rule behavioral2/files/0x000a000000023b75-3.dat upx behavioral2/memory/3312-12-0x0000000000400000-0x00000000006C1000-memory.dmp upx behavioral2/memory/3312-114-0x0000000000400000-0x00000000006C1000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Drops file in Windows directory 1 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process File opened for modification C:\Windows\svchost.com c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exec242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\TypedURLs c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Modifies registry class 1 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exepid Process 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid Process Token: 33 4552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4552 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exepid Process 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exepid Process 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exepid Process 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 3312 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription pid Process procid_target PID 3860 wrote to memory of 3312 3860 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 85 PID 3860 wrote to memory of 3312 3860 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 85 PID 3860 wrote to memory of 3312 3860 c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe 85 -
System policy modification 1 TTPs 6 IoCs
Processes:
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe"C:\Users\Admin\AppData\Local\Temp\c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3312
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x324 0x4041⤵
- Suspicious use of AdjustPrivilegeToken
PID:4552
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Change Default File Association
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Change Default File Association
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
C:\Users\Admin\AppData\Local\Temp\3582-490\c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe
Filesize530KB
MD502c9eb708d1e6d14fbb9455349ede85e
SHA1ed17a7d9b0eb740231cc8154281b8bd3452397e2
SHA2565638a4b19f3911aa543c1e2dac331192535f4fbcb60f0b8dc5c9485379b6b488
SHA5121c6a1760e65f3274f503f905e0948f5d1fef1836eb3fdb594b83a01a8127a1c3bb7c5576446db6d01ac00f2d330663e8f5b27daf39fbbdf2125f5ae4cfb47c17