Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe
Resource
win7-20240903-en
General
-
Target
6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe
-
Size
654KB
-
MD5
7533d0576eead381d2502ad6ba854263
-
SHA1
63b84f4f40172bf6d61884d4739325373a43b93d
-
SHA256
6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e
-
SHA512
7b629e3ebe2cca4bbde06c672cfd414883f23f103ff0809b7453a8e873ca3d87ced8597412a7b7a9d5abb6cdfc51c940556ba77eef97e6f21d413d906421ac18
-
SSDEEP
12288:r98rmdR3y4dqXLBzy6LRWohK9v26UrmAP6mY5O95Ev4uuYRY+hSIfiDbZwE:58VXpK9vJk6hO95sDKASIf9E
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
Loads dropped DLL 1 IoCs
pid Process 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
resource yara_rule behavioral1/memory/2476-3-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-9-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-5-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-8-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-10-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-11-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-7-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-6-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-12-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-13-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2476-45-0x0000000001E80000-0x0000000002F3A000-memory.dmp upx behavioral1/memory/2808-60-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-57-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-63-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-62-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-61-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-58-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-56-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-64-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-55-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-59-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-84-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-83-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-85-0x0000000004890000-0x000000000594A000-memory.dmp upx behavioral1/memory/2808-102-0x0000000004890000-0x000000000594A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76dc99 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe File opened for modification C:\Windows\SYSTEM.INI 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe File created C:\Windows\f770696 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Token: SeDebugPrivilege 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1108 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 19 PID 2476 wrote to memory of 1176 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 20 PID 2476 wrote to memory of 1200 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 21 PID 2476 wrote to memory of 400 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 25 PID 2476 wrote to memory of 2808 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 31 PID 2476 wrote to memory of 2808 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 31 PID 2476 wrote to memory of 2808 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 31 PID 2476 wrote to memory of 2808 2476 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 31 PID 2808 wrote to memory of 1108 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 19 PID 2808 wrote to memory of 1176 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 20 PID 2808 wrote to memory of 1200 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 21 PID 2808 wrote to memory of 400 2808 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe"C:\Users\Admin\AppData\Local\Temp\6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\qq_setup_21049\6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe"C:\Users\Admin\AppData\Local\Temp\qq_setup_21049\6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe" --temp3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2808
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5d05346ddb8a8d1db8cfb05056bfa43e3
SHA1a6ab97e140e4b4ad393207a2eda051b1be3a7fc5
SHA256be17993ab586946706bbc534c2d748a68ffb4d1d37c7bb94cdbfbd378ef25968
SHA512c3946a2b6b4514bdfae26802eb10018f506e550f0886bd8ef570263edcdc374c0660ce9729fa3bc1370aef03447af0240dbc23f205871181495c84d713fdacda
-
\Users\Admin\AppData\Local\Temp\qq_setup_21049\6f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e.exe
Filesize654KB
MD57533d0576eead381d2502ad6ba854263
SHA163b84f4f40172bf6d61884d4739325373a43b93d
SHA2566f5810535a71dbfd6b10517a871dfd85e5e5f9c3c504e16910f5c5d97211df0e
SHA5127b629e3ebe2cca4bbde06c672cfd414883f23f103ff0809b7453a8e873ca3d87ced8597412a7b7a9d5abb6cdfc51c940556ba77eef97e6f21d413d906421ac18