Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 23:33
Behavioral task
behavioral1
Sample
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe
Resource
win7-20241023-en
General
-
Target
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe
-
Size
4.6MB
-
MD5
4c520f8cc11f65e4f1ccb8ddc2f46f40
-
SHA1
1258a07017e98de7dc7801684653196be5f6b171
-
SHA256
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718d
-
SHA512
9fec2326f096a00ed8019b03d69dde009f44c978e8bf724f7656657a5feff0dea82bb9f5ef58a27b56be493015bbfd98c132e9ae0da85af395082379c033c588
-
SSDEEP
49152:QnsHyjtk2MYC5GDagN40mVXf7Ri46/pzCeLQ9+0RSIMDo6DQjYv0RDWC7xax:Qnsmtk2aZ0U76Cec3f+5Ejo0RDFax
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 7 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe:*:enabled:@shell32.dll,-1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Sality family
-
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Xred family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Processes:
resource yara_rule behavioral2/memory/1320-10-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-5-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-8-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-9-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-6-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-4-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-7-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-3-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-11-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-14-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-15-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-24-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-115-0x0000000002690000-0x000000000371E000-memory.dmp upx behavioral2/memory/1320-127-0x0000000002690000-0x000000000371E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Modifies registry class 1 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exepid process 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exepid process 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription pid process Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe Token: SeDebugPrivilege 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription pid process target process PID 1320 wrote to memory of 616 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe winlogon.exe PID 1320 wrote to memory of 616 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe winlogon.exe PID 1320 wrote to memory of 616 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe winlogon.exe PID 1320 wrote to memory of 616 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe winlogon.exe PID 1320 wrote to memory of 616 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe winlogon.exe PID 1320 wrote to memory of 616 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe winlogon.exe PID 1320 wrote to memory of 676 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe lsass.exe PID 1320 wrote to memory of 676 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe lsass.exe PID 1320 wrote to memory of 676 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe lsass.exe PID 1320 wrote to memory of 676 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe lsass.exe PID 1320 wrote to memory of 676 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe lsass.exe PID 1320 wrote to memory of 676 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe lsass.exe PID 1320 wrote to memory of 784 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 784 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 784 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 784 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 784 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 784 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 792 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 792 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 792 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 792 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 792 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 792 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe fontdrvhost.exe PID 1320 wrote to memory of 800 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 800 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 800 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 800 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 800 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 800 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 904 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 904 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 904 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 904 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 904 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 904 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 956 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 956 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 956 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 956 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 956 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 956 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 384 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe dwm.exe PID 1320 wrote to memory of 384 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe dwm.exe PID 1320 wrote to memory of 384 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe dwm.exe PID 1320 wrote to memory of 384 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe dwm.exe PID 1320 wrote to memory of 384 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe dwm.exe PID 1320 wrote to memory of 384 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe dwm.exe PID 1320 wrote to memory of 744 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 744 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 744 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 744 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 744 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 744 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 924 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 924 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 924 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 924 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 924 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 924 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 952 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 952 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 952 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe PID 1320 wrote to memory of 952 1320 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe svchost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:384
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:800
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2884
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3752
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3840
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3904
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3996
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3448
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2268
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4820
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:1508
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3316
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1112
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1172
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:1044
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1388
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2928
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1660
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2040
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2504
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3352
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe"C:\Users\Admin\AppData\Local\Temp\7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1320
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2120
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3520
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_7e47132f726b6c12111af7f735e696e6a249ecc17f0650e6c426cff17467718dN.exe
Filesize3.8MB
MD56b94c4c9f3d5a0683bba4a5393f390b0
SHA11739ad2de0657ebfad79c6afae5e21534e30ed79
SHA2560ffa500a0030bb50db600fda2b44b19c554394f30cf570958ce8cbf1ea97e2df
SHA512189fdf47a8012fc0b98bef0383b6ec3e7a67348c7eb3c5ee5f014dca09944b8ea31fd5375aaa16b8fc7f92325f09de66472e0420c3eda11bd2f27f9b5c9afc5a