Analysis
-
max time kernel
25s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe
Resource
win7-20240903-en
General
-
Target
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe
-
Size
1.1MB
-
MD5
c832f6489b257134b75c3108b02c3bd0
-
SHA1
3c0e169c5b51d3cd599afaec3559408ee0978f1a
-
SHA256
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03c
-
SHA512
0dc42315fba0c7ece9257092787401748e12ded10fca2648ed3949b1732c8257d5893c39d3c42bfd9a7e37689213016c6da40574454d46386547e910e4226650
-
SSDEEP
24576:W1/aGLDCM4D8ayGMCPnXo8/18o4YYfDV7I8qgk4YkVvfKtbFVixj4uLhYfqa:FD8ayGM0XolV7I8rYkVvfKtbFVixj4uw
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ihyyek.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" ihyyek.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 2724 ihyyek.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 ihyyek.exe -
Loads dropped DLL 2 IoCs
pid Process 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ihyyek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ihyyek.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\ihyyek.exe" ihyyek.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ihyyek.exe -
resource yara_rule behavioral1/memory/2120-1-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-6-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-3-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-4-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-7-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-5-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-8-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-10-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-23-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-49-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2120-9-0x0000000002110000-0x000000000319E000-memory.dmp upx behavioral1/memory/2724-146-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-148-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-164-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-166-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-167-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-168-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-165-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-149-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-169-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-200-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-199-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-201-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-235-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-202-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-236-0x00000000024F0000-0x000000000357E000-memory.dmp upx behavioral1/memory/2724-275-0x00000000024F0000-0x000000000357E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ihyyek.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 2724 ihyyek.exe 2724 ihyyek.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe Token: SeDebugPrivilege 2724 ihyyek.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1048 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 18 PID 2120 wrote to memory of 1120 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 20 PID 2120 wrote to memory of 1168 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 21 PID 2120 wrote to memory of 1984 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 23 PID 2120 wrote to memory of 2724 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 31 PID 2120 wrote to memory of 2724 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 31 PID 2120 wrote to memory of 2724 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 31 PID 2120 wrote to memory of 2724 2120 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe 31 PID 2724 wrote to memory of 1048 2724 ihyyek.exe 18 PID 2724 wrote to memory of 1120 2724 ihyyek.exe 20 PID 2724 wrote to memory of 1168 2724 ihyyek.exe 21 PID 2724 wrote to memory of 1984 2724 ihyyek.exe 23 PID 2724 wrote to memory of 1048 2724 ihyyek.exe 18 PID 2724 wrote to memory of 1120 2724 ihyyek.exe 20 PID 2724 wrote to memory of 1168 2724 ihyyek.exe 21 PID 2724 wrote to memory of 1984 2724 ihyyek.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ihyyek.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1048
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe"C:\Users\Admin\AppData\Local\Temp\2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2120 -
C:\ProgramData\ihyyek.exe"C:\ProgramData\ihyyek.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2724
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD56f1656028d98fceaa83d9b6f8cc5459d
SHA17f2e990ad5347f6613683e7efa86f08ebfa9f4a6
SHA2562121af2516f030cebfd88efb6b6c195ecc4573cdbc79595253af54970a0a8a9a
SHA512cc0ede5bd411363d4f6a81e20521af15865decedbfb539702744f8cafc2087533a513f4a7541cb0eb3447411397cd042d00232e9d091a97e09043711379ce71e
-
Filesize
522KB
MD535fa006430474151ead7c3254d649772
SHA1c02db50a465be5ac0d127cd1608d76249ba91f46
SHA256f2259760d560d2b83a5dfe622cd7a905d9678213756ac1b81720651fcfe930a1
SHA51241a8a5dd2361d48558688ea2ceae6d5dd5f1b26907a9464e94c621047cf58172ef7d08fdaccf994012c4c2a54d49b1c752581f380e989f691722a6469a3e10ef
-
Filesize
257B
MD54bdba237ce56a12d5e06788351123456
SHA1c4e5764f4a479916fae283554701ea86908e630f
SHA256e2c207cb541c3c95a650809fb8996c86b5fde15d67a716105062af3c29e11b2a
SHA51249599692f0f269b9bbe836048f85c4face526a74e1f830e3e5147e585d62cf335030a4087ed40d4630bd2b5c69e116689d998a536cd025d25bee285133c15399