Analysis
-
max time kernel
118s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 10:24
Behavioral task
behavioral1
Sample
e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/calc.exe
Resource
win7-20241010-en
General
-
Target
e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe
-
Size
1.5MB
-
MD5
035540cc3211f5648f6aef5998678ea0
-
SHA1
f55d2aa510d18c9d4f83e3d3b0ada6566a7ae58b
-
SHA256
e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4a
-
SHA512
f2c91ff337cae040c1abf25bef2ecc93827c21689be7ad3ed671ac2591bd7a1d84c68595187ed75a5e5c2887f64b8e4037bdf9fd57a3281324d0a4cab8761a20
-
SSDEEP
49152:kYyk+aDRiEmsQnMG0N8MZs3nvQFExBibij:hyk+aDRZQMFC5noFd2j
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000015d41-52.dat acprotect behavioral1/files/0x0006000000016c73-54.dat acprotect -
resource yara_rule behavioral1/files/0x0006000000016cc5-73.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2644 calc.exe -
Loads dropped DLL 10 IoCs
pid Process 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\T: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\U: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\X: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\I: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\N: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\O: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\P: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\R: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\W: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\H: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\J: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\L: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\M: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\Z: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\G: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\Q: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\S: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\V: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\Y: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened (read-only) \??\E: e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened for modification F:\autorun.inf e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
resource yara_rule behavioral1/memory/1876-2-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-6-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-4-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-8-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-7-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-10-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-11-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-5-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-9-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-24-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-26-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/files/0x0035000000015cd1-33.dat upx behavioral1/files/0x0007000000015d41-52.dat upx behavioral1/memory/2644-40-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/files/0x0006000000016c73-54.dat upx behavioral1/memory/1876-60-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/2644-62-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/2644-61-0x0000000000360000-0x00000000003B8000-memory.dmp upx behavioral1/memory/1876-77-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-78-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-80-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-81-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-82-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-85-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-87-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/2644-90-0x0000000000360000-0x00000000003B8000-memory.dmp upx behavioral1/memory/2644-89-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2644-103-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1876-105-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/2644-107-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1876-109-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-112-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral1/memory/1876-113-0x00000000023E0000-0x000000000346E000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\DisplayName = "°Ù¶È" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\URL = "http://www.baidu.com/s?wd={searchTerms}&tn=site888_1_pg&cl=3&ie=utf-8" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{24588FA4-10F1-41D7-B19D-6E22361E47FA}" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA} e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\Codepage = "65001" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe Token: SeDebugPrivilege 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe 2644 calc.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 2644 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 28 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 PID 1876 wrote to memory of 1072 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 18 PID 1876 wrote to memory of 1120 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 19 PID 1876 wrote to memory of 1184 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 21 PID 1876 wrote to memory of 324 1876 e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe 23 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1072
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe"C:\Users\Admin\AppData\Local\Temp\e849a572a97e2c481768278f885a774bd60291f9d7aa75954470037709252d4aN.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\nsd89AA.tmp\calc.exeC:\Users\Admin\AppData\Local\Temp\nsd89AA.tmp\calc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:324
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD52c9e22f960ca9c2f4caaa2a37d443eda
SHA13b90206f1ebb726013067adba3bc180f3c388f0a
SHA256fbdb8ece088f95538de2690a630af44709be2c0cc5a1693bb4db2ed71d1661d3
SHA512e307f5edc36695f10e20692df02fa5de661f7ef57257a2c41cc459cea9430bd162fb9eb7679b19f50e4400abf31413520a0b1a44bfc48261d56a2941094afdf4
-
Filesize
100KB
MD572264491e915844d307d5fd7ea718b2c
SHA185d0f3fa040cad484a3139f3eafbe91cc23a232c
SHA2566e52cad9ceb82919a4a1c2668ee64a4c6f510c217d60009187fd91738e2d736a
SHA51236da6ed1a1e80eef355aa3265921b22771af8cdf7385b637511fd61aa7a428d0f2d07bf82c53d2eec1f64acb5e8de42dd36fdcb9c8879033e94c807ba43b6ecd
-
Filesize
408KB
MD5709f1646c30262b9f77a8aa72b29c59f
SHA13167a0f7382fdbd7990d63ffc2160b976690f1df
SHA2567172c513f350e70465f2015e3bfa4e58a1ba69d1bf783c684f40fd8483f1c883
SHA5123377556481f9c9734fcff765b0d48b38939ac68fe46f7a369fd627acc07d08cfe371847177965b07635c1ad028ff4d03d4bf98505d37233c829d5f996ebabec0
-
Filesize
200KB
MD5c597e19abcd8c10ea2ac0d33c419a93e
SHA118df89699e55745ef26bbffafb2ecfc8492a4492
SHA2565ed76826bd31aa480d6e615da89fd023921810bcdacfdbf5ec090974afe321d6
SHA51273a9869466e3c59112e22e6ba75f8e4d901fbd6acc6a1c1248963a7371d6a27b197f35ab7605559428262be852291bc78b081259a8a2f0f6ed066be371678c25
-
Filesize
113KB
MD590598b9170d705d6ba5f4a8fd99359f0
SHA1154505937c94821696f65c94af869b3393415f6b
SHA256962dc01fdbe0aa30a0b7c1b235073e8bdf285cceaa7b98e19257d68e5164a0d2
SHA5127024123f2648258638696a3258932444827dc4ef98453d244d3392e9411369de50a6dc373b2fcc300c9a6a3db9d069f22222168073f632a29dd2c36e1285c000
-
Filesize
429KB
MD54fbc687f3af1e007a5ffabbda393ec7b
SHA1b714435f7150608adc23d3df4d783bae1066b10e
SHA2561d4bb9515b54e265985129591a53af9eba38dac98094d352427bd9f819b8c6fe
SHA512694a43b8cfa41357065f948df1036e954d730038156a079d7528f732b574dc60d0dbd0fc88bbba615e9c26ed04821260a1740f3d15769e8730885a51859d7502
-
Filesize
1.3MB
MD597e47588a35219417f64ee2184e99118
SHA137d77f2594d3a5e81f4aebe0efdc24506b17f542
SHA256fd20d30fb61ae75dfb715837d811250b2dcce0fc40b2bd3af6533dac50860513
SHA51239c550d772940d06be3dfdd27ae051a895a2e9887a837131b21ac9470f5e9fb929e8c29d4338cdd8b5406c42973d84546312ac3767c28006a1b77192937bfa1a