Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe
Resource
win7-20240708-en
General
-
Target
7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe
-
Size
767KB
-
MD5
f48c142ac82f6874d1256c5f266a6ef2
-
SHA1
bb1d810cfa29eab5d37543ddca8b643887ac5855
-
SHA256
7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de
-
SHA512
6d038c06a69c9cf446b002d1cc9297051e87478e6a7d755152a5309ca587b37b727d13903a322a4ffa757d95024c26ef4d2b06eb3856d9f9f79fa5ee705a4def
-
SSDEEP
12288:AdsBWptwlMYHUVmkzTyuhdQFdOq8mC4qJQAwXIoccqWT8kSHi6GP0gd6m56FliAV:AW0pmmY0Vm+1hd5t7w9ccGC6GPB8iAV
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 update.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 update.exe 1732 update.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened (read-only) \??\M: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened (read-only) \??\E: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened (read-only) \??\G: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened (read-only) \??\H: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened (read-only) \??\I: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened (read-only) \??\J: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened (read-only) \??\K: 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
resource yara_rule behavioral2/memory/2792-1-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-6-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-7-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-11-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-12-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-21-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-23-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-20-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-10-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-8-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-62-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-63-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-64-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-65-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-66-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-68-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-70-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-72-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-76-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-77-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-85-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-86-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-90-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-96-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/2792-133-0x00000000024F0000-0x00000000035AA000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\e5798c5 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened for modification C:\Windows\SYSTEM.INI 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe File opened for modification C:\Windows\setupapi.log update.exe File opened for modification \??\c:\windows\KB888111.log update.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe Token: SeDebugPrivilege 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2792 wrote to memory of 808 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 9 PID 2792 wrote to memory of 804 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 10 PID 2792 wrote to memory of 388 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 13 PID 2792 wrote to memory of 3000 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 50 PID 2792 wrote to memory of 3064 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 51 PID 2792 wrote to memory of 3144 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 53 PID 2792 wrote to memory of 3484 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 56 PID 2792 wrote to memory of 3584 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 57 PID 2792 wrote to memory of 3768 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 58 PID 2792 wrote to memory of 3860 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 59 PID 2792 wrote to memory of 3920 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 60 PID 2792 wrote to memory of 3992 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 61 PID 2792 wrote to memory of 3720 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 62 PID 2792 wrote to memory of 2252 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 75 PID 2792 wrote to memory of 2052 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 76 PID 2792 wrote to memory of 1732 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 82 PID 2792 wrote to memory of 1732 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 82 PID 2792 wrote to memory of 1732 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 82 PID 2792 wrote to memory of 808 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 9 PID 2792 wrote to memory of 804 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 10 PID 2792 wrote to memory of 388 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 13 PID 2792 wrote to memory of 3000 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 50 PID 2792 wrote to memory of 3064 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 51 PID 2792 wrote to memory of 3144 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 53 PID 2792 wrote to memory of 3484 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 56 PID 2792 wrote to memory of 3584 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 57 PID 2792 wrote to memory of 3768 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 58 PID 2792 wrote to memory of 3860 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 59 PID 2792 wrote to memory of 3920 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 60 PID 2792 wrote to memory of 3992 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 61 PID 2792 wrote to memory of 3720 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 62 PID 2792 wrote to memory of 2252 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 75 PID 2792 wrote to memory of 2052 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 76 PID 2792 wrote to memory of 1732 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 82 PID 2792 wrote to memory of 1732 2792 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe 82 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:808
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:804
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:388
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3064
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3144
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe"C:\Users\Admin\AppData\Local\Temp\7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2792 -
\??\c:\86da2261a5f99e5c9c07abe55e227a\update\update.exec:\86da2261a5f99e5c9c07abe55e227a\update\update.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3584
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3768
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3860
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3920
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3992
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3720
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2252
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD513f40799bd1bf4b7e3e8c77194121342
SHA12d723e5d9abc98f1432c939cd7626d102469c12d
SHA2562a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17
SHA512237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed
-
Filesize
363KB
MD594b3ff0f65e277bdbbc5e39747ea034d
SHA14bfb51f6d77f5123728c0bf360f4396617c1cd5e
SHA2565e4f341be4c0627d02282aad5f1df9a73cf9600f41325c0fd3783f119f421b81
SHA5128643b0b7c38e9fa18d1537bb783a6674e37600d2e882d7ea66c26ffb761eaeeb87a69d04513525c34b2dea964b8a90cd11c4a2e863ac58766c4d5b06ddf47d24
-
C:\Users\Admin\AppData\Local\Temp\0E579A8A_Rar\7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de.exe
Filesize703KB
MD512a8816119a4982fd8e522fb974ee284
SHA15728e05c61af004536d5c0b65cca0fefd89066c0
SHA256ca81e833aca7a7b9c41038dedbf85e9381e709fd558c36c4e4c272231e411063
SHA51275d971b1112eef2250c9a91337d228a914daa82885b1132228988c4e62dca228bfd51f150698696523870b5e064e0530a523b7a7a828079e29a031c7eb24176a
-
Filesize
8KB
MD553f295b0d5174cae972a2ac2ffd5ff77
SHA16a012113496c8f0857a0e741a5375e8c1dbcf0fe
SHA256b1b0c9fc7967e8897a411b22e37fe6dda27c401de1e867440f94caf085cbdb05
SHA5129dd2a798ce0e6a35a97acd38bc4dcb713f86e9697b0889a81907454f80f6be98973a7569cfddd88bbaeb21099ea0ef345c5d791993cacf1d8163bdd1c821c7e2