Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe
Resource
win7-20241010-en
General
-
Target
6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe
-
Size
513KB
-
MD5
b0c7935e55a0cf8eea48278b8742ffe5
-
SHA1
fc0a97f51f3b639e419f1dc7d58d023f523fbd0a
-
SHA256
6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f
-
SHA512
65b1b88530acc1fc079c68357fddcb58c21752ae82501c6342b461364e4e33db39ae39565c291ba477c52f4d5ca2f434ea9d3b6562028fd8b8072c2905546d2e
-
SSDEEP
12288:mCqdpDDidnjjjawM8+Eo0DFukplf1aC8R5oPP:vqdQNjmwM8+Eo0DFukpZ12R5oPP
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
resource yara_rule behavioral2/memory/4628-1-0x0000000002360000-0x000000000341A000-memory.dmp upx behavioral2/memory/4628-3-0x0000000002360000-0x000000000341A000-memory.dmp upx behavioral2/memory/4628-4-0x0000000002360000-0x000000000341A000-memory.dmp upx behavioral2/memory/4628-6-0x0000000002360000-0x000000000341A000-memory.dmp upx behavioral2/memory/4628-5-0x0000000002360000-0x000000000341A000-memory.dmp upx behavioral2/memory/4628-10-0x0000000002360000-0x000000000341A000-memory.dmp upx behavioral2/memory/4628-16-0x0000000002360000-0x000000000341A000-memory.dmp upx behavioral2/memory/4628-24-0x0000000002360000-0x000000000341A000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\e5770da 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe File opened for modification C:\Windows\SYSTEM.INI 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe Token: SeDebugPrivilege 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4628 wrote to memory of 792 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 9 PID 4628 wrote to memory of 800 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 10 PID 4628 wrote to memory of 60 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 13 PID 4628 wrote to memory of 2964 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 51 PID 4628 wrote to memory of 3024 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 52 PID 4628 wrote to memory of 2636 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 53 PID 4628 wrote to memory of 3436 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 56 PID 4628 wrote to memory of 3564 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 57 PID 4628 wrote to memory of 3740 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 58 PID 4628 wrote to memory of 3840 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 59 PID 4628 wrote to memory of 3904 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 60 PID 4628 wrote to memory of 3992 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 61 PID 4628 wrote to memory of 4112 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 62 PID 4628 wrote to memory of 2316 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 64 PID 4628 wrote to memory of 1800 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 76 PID 4628 wrote to memory of 4264 4628 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe 81 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:60
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3024
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2636
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe"C:\Users\Admin\AppData\Local\Temp\6ac8fd8600ec7994dce058aeef76934a633eecbbf2c881b70b676882e98ed00f.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4628
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3564
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3740
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3904
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3992
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2316
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1800
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4264
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5