Overview
overview
10Static
static
100.46582298...58.exe
windows7-x64
700331dd25b...3a.exe
windows7-x64
10065988f36f...a0.exe
windows7-x64
30826716413...57.exe
windows7-x64
1008cf8ed94c...a4.exe
windows7-x64
100997ba7292...3c.exe
windows7-x64
30b7996bca4...5f.exe
windows7-x64
0c3431dbb8...ui.dll
windows7-x64
50cd7440ca9...bc.exe
windows7-x64
10100b8bfff5...ir.exe
windows7-x64
3101.ex_.exe
windows7-x64
3119.executable.exe
windows7-x64
6119.unp.exe
windows7-x64
611abb44de5...47.exe
windows7-x64
1011fb52c968...22.exe
windows7-x64
10123.exe
windows7-x64
1139.exe
windows7-x64
113E418BF18...73.dll
windows7-x64
3144.exe
windows7-x64
117697e1829...44.dll
windows7-x64
319561b3379...er.exe
windows7-x64
1019ec0d0e51...C5.exe
windows7-x64
71a6bed2aff...f2.exe
windows7-x64
101f210c60f9...40.exe
windows7-x64
101f3509cc11...dd.exe
windows7-x64
1020c6d29da8...7d.exe
windows7-x64
9234e77145d...2d.exe
windows7-x64
10263fc6fc9e...32.exe
windows7-x64
92e0da054d0...23.zip
windows7-x64
9Compenso.P...__.exe
windows7-x64
9301a3f5017...5f.exe
windows7-x64
1030620.ex_.exe
windows7-x64
10Analysis
-
max time kernel
300s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 02:14
Behavioral task
behavioral1
Sample
0.4658229854220858.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00331dd25b83984d4b6d9753fec2b306e88ac87371ea48188df49cb630905d3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
065988f36f3ab99ff40893c7ad756cfcc3baea1b8b5217f17cdd6e44160df0a0.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
082671641341d89fe49d0da717846035ba6af02edb59840148eddc3586d21557.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0997ba7292ddbac1c7e7ade6766ed53c.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0b7996bca486575be15e68dba7cbd802b1e5f90436ba23f802da66292c8a055f.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
0c3431dbb8cd0478250eb4357257880e_localui.dll
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
101.ex_.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
119.executable.exe
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
119.unp.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
11abb44de53807e32980a010a473514694f901841e63ab33f5e0ff8754009b47.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
11fb52c96853e12f011b7b7894e9884e56eb5522.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
123.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
139.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
13E418BF18B03AC80580DB69ADA305A2B7093DFED00692DCF91A99D2526D3A73.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
144.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
17697e1829f0d18d2051a67bc2bca134_da3ded254909e9abaa46eb5bc3b10944.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
19ec0d0e5143940492a1c79c06eb8f18aa9feb356e41b8b79fdc6a16a3bcd7bf_TDS=4F9B33C5.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1f210c60f90fd8403099482455f3220b56b2864bc4d2b6af0abda4a2c3854d40.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
1f3509cc11ffa1f7d839df93615cf1ba0819d75cafd5ef59110d9b01fb90addd.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
20c6d29da875075afa0ed7b4fb58e555de89d4bed13bf5ad109817c593ddd77d.exe
Resource
win7-20241023-en
Behavioral task
behavioral27
Sample
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
263fc6fc9efa4c05a08d9ff1fc7bb060a7b8f376f82afa17fd3fc267bc8e8032.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
2e0da054d03fde4e7b2c2057cc4aa410c64b6ab8777ee6d4fd43f031a5170a23.zip
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Compenso.Pdf______________________________________________________________.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
30620.ex_.exe
Resource
win7-20241010-en
General
-
Target
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe
-
Size
488KB
-
MD5
cbb57e24964c4f12adc9a2db6b8bcb65
-
SHA1
e968b7fd762475c6eab8cd5b3f32ebc56944d95c
-
SHA256
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d
-
SHA512
2827258fc71966d7e22902d214e97bc8ea1aa982088f0cbf09c8e8a8f71a852ac3206a456a9585bdc17c1755556104e9adfe225432516fb62b029d46a582fc41
-
SSDEEP
12288:UzcRD02J4Sq2vHGB67KWKKmDKLPJ8W2jTAnPhrIh5H:+cRToImoAmLOW2yPhw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe" 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
Drops startup file 1 IoCs
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe.lnk 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral27/memory/2120-29-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral27/memory/2120-38-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral27/memory/2120-55-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Processes:
resource yara_rule behavioral27/memory/2120-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral27/memory/2120-29-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral27/memory/2120-38-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral27/memory/2120-55-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.execmd.execmd.execmd.execmd.execmd.exetaskkill.execmd.exetaskkill.execmd.execmd.execmd.exetaskkill.exetaskkill.exetaskkill.execmd.exetaskkill.exe234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.execmd.execmd.exetaskkill.execmd.execmd.exetaskkill.exetaskkill.execmd.exetaskkill.exetaskkill.execmd.exetaskkill.exetaskkill.exetaskkill.execmd.execmd.exetaskkill.execmd.exetaskkill.exetaskkill.exetaskkill.execmd.exetaskkill.exetaskkill.exetaskkill.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 22 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2060 taskkill.exe 2872 taskkill.exe 2880 taskkill.exe 1876 taskkill.exe 2696 taskkill.exe 380 taskkill.exe 1476 taskkill.exe 264 taskkill.exe 1916 taskkill.exe 1256 taskkill.exe 388 taskkill.exe 2640 taskkill.exe 2556 taskkill.exe 2224 taskkill.exe 988 taskkill.exe 2268 taskkill.exe 2396 taskkill.exe 2840 taskkill.exe 1968 taskkill.exe 1604 taskkill.exe 2404 taskkill.exe 1508 taskkill.exe -
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exepid process 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exepid process 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2640 taskkill.exe Token: SeDebugPrivilege 2396 taskkill.exe Token: SeDebugPrivilege 2696 taskkill.exe Token: SeDebugPrivilege 2556 taskkill.exe Token: SeDebugPrivilege 2060 taskkill.exe Token: SeDebugPrivilege 380 taskkill.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeDebugPrivilege 2840 taskkill.exe Token: SeDebugPrivilege 1968 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 264 taskkill.exe Token: SeDebugPrivilege 2880 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 1604 taskkill.exe Token: SeDebugPrivilege 1916 taskkill.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 1876 taskkill.exe Token: SeDebugPrivilege 2404 taskkill.exe Token: SeDebugPrivilege 388 taskkill.exe Token: SeDebugPrivilege 2268 taskkill.exe Token: SeDebugPrivilege 1508 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exepid process 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2120 wrote to memory of 1504 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 1504 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 1504 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 1504 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 1504 wrote to memory of 2640 1504 cmd.exe taskkill.exe PID 1504 wrote to memory of 2640 1504 cmd.exe taskkill.exe PID 1504 wrote to memory of 2640 1504 cmd.exe taskkill.exe PID 1504 wrote to memory of 2640 1504 cmd.exe taskkill.exe PID 2120 wrote to memory of 2924 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2924 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2924 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2924 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2924 wrote to memory of 2396 2924 cmd.exe taskkill.exe PID 2924 wrote to memory of 2396 2924 cmd.exe taskkill.exe PID 2924 wrote to memory of 2396 2924 cmd.exe taskkill.exe PID 2924 wrote to memory of 2396 2924 cmd.exe taskkill.exe PID 2120 wrote to memory of 2784 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2784 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2784 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2784 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2784 wrote to memory of 2696 2784 cmd.exe taskkill.exe PID 2784 wrote to memory of 2696 2784 cmd.exe taskkill.exe PID 2784 wrote to memory of 2696 2784 cmd.exe taskkill.exe PID 2784 wrote to memory of 2696 2784 cmd.exe taskkill.exe PID 2120 wrote to memory of 2644 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2644 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2644 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2644 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2644 wrote to memory of 2556 2644 cmd.exe taskkill.exe PID 2644 wrote to memory of 2556 2644 cmd.exe taskkill.exe PID 2644 wrote to memory of 2556 2644 cmd.exe taskkill.exe PID 2644 wrote to memory of 2556 2644 cmd.exe taskkill.exe PID 2120 wrote to memory of 2444 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2444 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2444 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2444 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2444 wrote to memory of 2060 2444 cmd.exe taskkill.exe PID 2444 wrote to memory of 2060 2444 cmd.exe taskkill.exe PID 2444 wrote to memory of 2060 2444 cmd.exe taskkill.exe PID 2444 wrote to memory of 2060 2444 cmd.exe taskkill.exe PID 2120 wrote to memory of 2484 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2484 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2484 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2484 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2484 wrote to memory of 380 2484 cmd.exe taskkill.exe PID 2484 wrote to memory of 380 2484 cmd.exe taskkill.exe PID 2484 wrote to memory of 380 2484 cmd.exe taskkill.exe PID 2484 wrote to memory of 380 2484 cmd.exe taskkill.exe PID 2120 wrote to memory of 1732 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 1732 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 1732 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 1732 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 1732 wrote to memory of 2872 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 2872 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 2872 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 2872 1732 cmd.exe taskkill.exe PID 2120 wrote to memory of 2016 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2016 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2016 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2120 wrote to memory of 2016 2120 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe cmd.exe PID 2016 wrote to memory of 2840 2016 cmd.exe taskkill.exe PID 2016 wrote to memory of 2840 2016 cmd.exe taskkill.exe PID 2016 wrote to memory of 2840 2016 cmd.exe taskkill.exe PID 2016 wrote to memory of 2840 2016 cmd.exe taskkill.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu = "1" 234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe"C:\Users\Admin\AppData\Local\Temp\234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Drops startup file
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4