Analysis
-
max time kernel
23s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe
Resource
win7-20240708-en
General
-
Target
53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe
-
Size
576KB
-
MD5
e75eb7ec59b063d003c27d6a7beb0cb0
-
SHA1
fd6b271010e01f5a63766dfabc23d96eb6cabdc8
-
SHA256
53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849
-
SHA512
6ec26ad4969758a619dba4755fd92c035d790cbcf7ce795daf647c54e9e3c074ee706b2505780f956d48a9fbc0c4c8fe7106974a0a4898e24820aee625899ad0
-
SSDEEP
3072:Wo/L5tpV+CSA1AAPoCpxW5ATBfUNjpS1svkTVC9FieYTTLprx/m3qT4S826guKqf:DtpvoCpcNQ1jQdiJKFRvA+npAJkYEnr
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" svchost.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe -
Adds policy Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" svchost.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 5 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe Global.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe svchost.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe system.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe system.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Global.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation svchost.exe -
Deletes itself 1 IoCs
pid Process 1080 svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3496 Global.exe 1080 svchost.exe 4640 system.exe 2224 system.exe -
Modifies system executable filetype association 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" Global.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe -
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" system.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Drops autorun.inf file 1 TTPs 12 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf Global.exe File opened for modification D:\autorun.inf Global.exe File opened for modification F:\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File created C:\WINDOWS\SysWOW64\dllcache\autorun.inf 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File opened for modification C:\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created D:\autorun.inf Global.exe File created F:\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\dllcache\Default.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\svchost.exe Global.exe File created C:\WINDOWS\SysWOW64\regedit.exe Global.exe File created C:\WINDOWS\SysWOW64\regedit.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E} 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe Global.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\SysWOW64\dllcache\autorun.inf 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E)\Global.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Global.exe Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File created C:\WINDOWS\SysWOW64\regedit.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E)\svchost.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\regedit.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ system.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Default.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe -
resource yara_rule behavioral2/memory/4816-1-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-3-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-4-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-6-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-11-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-13-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-5-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-15-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-16-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-20-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-21-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-102-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/4816-105-0x0000000002CE0000-0x0000000003D6E000-memory.dmp upx behavioral2/memory/1080-134-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-136-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-139-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-137-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-132-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-130-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-138-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-135-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-133-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-151-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-150-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-154-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-162-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-177-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-178-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-186-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-187-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-188-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-190-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-191-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx behavioral2/memory/1080-192-0x0000000002F40000-0x0000000003FCE000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe svchost.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe svchost.exe -
Drops file in Windows directory 48 IoCs
description ioc Process File opened for modification C:\WINDOWS\Fonts\Fonts.exe Global.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs Global.exe File created C:\WINDOWS\Fonts\Fonts.exe svchost.exe File created C:\WINDOWS\system\KEYBOARD.exe system.exe File created C:\WINDOWS\pchealth\Global.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com svchost.exe File created C:\WINDOWS\pchealth\Global.exe system.exe File created C:\WINDOWS\pchealth\Global.exe system.exe File created C:\WINDOWS\Help\microsoft.hlp system.exe File created C:\WINDOWS\Fonts\tskmgr.exe system.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\Help\microsoft.hlp 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\Fonts\tskmgr.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com Global.exe File opened for modification C:\WINDOWS\system\KEYBOARD.exe Global.exe File created C:\WINDOWS\Media\rndll32.pif svchost.exe File created C:\WINDOWS\system\KEYBOARD.exe system.exe File opened for modification C:\WINDOWS\Fonts\wav.wav 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\Help\microsoft.hlp Global.exe File opened for modification C:\WINDOWS\Media\rndll32.pif Global.exe File created C:\WINDOWS\Cursors\Boom.vbs Global.exe File created C:\WINDOWS\system\KEYBOARD.exe svchost.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com system.exe File created C:\WINDOWS\Help\microsoft.hlp system.exe File created C:\WINDOWS\Cursors\Boom.vbs system.exe File created C:\WINDOWS\Fonts\wav.wav 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs system.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs system.exe File created C:\WINDOWS\Cursors\Boom.vbs 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\pchealth\Global.exe Global.exe File created C:\WINDOWS\Media\rndll32.pif system.exe File created C:\WINDOWS\Fonts\Fonts.exe system.exe File created C:\WINDOWS\system\KEYBOARD.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\Cursors\Boom.vbs svchost.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com system.exe File opened for modification C:\Windows\SYSTEM.INI 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File opened for modification C:\WINDOWS\Fonts\tskmgr.exe Global.exe File created C:\WINDOWS\pchealth\Global.exe svchost.exe File created C:\WINDOWS\Help\microsoft.hlp svchost.exe File created C:\WINDOWS\Fonts\tskmgr.exe system.exe File created C:\WINDOWS\Fonts\Fonts.exe 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe File created C:\WINDOWS\Fonts\tskmgr.exe svchost.exe File created C:\WINDOWS\Fonts\Fonts.exe system.exe File created C:\WINDOWS\Media\rndll32.pif system.exe File created C:\WINDOWS\Cursors\Boom.vbs system.exe File created C:\WINDOWS\Media\rndll32.pif 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Global.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe -
Modifies Control Panel 20 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\AutoEndTasks = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\AutoEndTasks = "1" system.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\AutoEndTasks = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\AutoEndTasks = "1" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" system.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\AutoEndTasks = "1" Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" system.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop system.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" Global.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop system.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe -
Modifies registry class 57 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile system.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 1080 svchost.exe 1080 svchost.exe 1080 svchost.exe 1080 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Token: SeDebugPrivilege 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 3496 Global.exe 1080 svchost.exe 4640 system.exe 2224 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 776 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 8 PID 4816 wrote to memory of 780 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 9 PID 4816 wrote to memory of 1016 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 13 PID 4816 wrote to memory of 2852 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 49 PID 4816 wrote to memory of 2884 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 50 PID 4816 wrote to memory of 2156 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 52 PID 4816 wrote to memory of 3432 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 56 PID 4816 wrote to memory of 3536 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 57 PID 4816 wrote to memory of 3736 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 58 PID 4816 wrote to memory of 3872 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 59 PID 4816 wrote to memory of 3948 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 60 PID 4816 wrote to memory of 4040 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 61 PID 4816 wrote to memory of 4156 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 62 PID 4816 wrote to memory of 2060 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 74 PID 4816 wrote to memory of 112 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 76 PID 4816 wrote to memory of 532 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 81 PID 4816 wrote to memory of 3496 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 83 PID 4816 wrote to memory of 3496 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 83 PID 4816 wrote to memory of 3496 4816 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe 83 PID 3496 wrote to memory of 1080 3496 Global.exe 85 PID 3496 wrote to memory of 1080 3496 Global.exe 85 PID 3496 wrote to memory of 1080 3496 Global.exe 85 PID 1080 wrote to memory of 776 1080 svchost.exe 8 PID 1080 wrote to memory of 780 1080 svchost.exe 9 PID 1080 wrote to memory of 1016 1080 svchost.exe 13 PID 1080 wrote to memory of 2852 1080 svchost.exe 49 PID 1080 wrote to memory of 2884 1080 svchost.exe 50 PID 1080 wrote to memory of 2156 1080 svchost.exe 52 PID 1080 wrote to memory of 3432 1080 svchost.exe 56 PID 1080 wrote to memory of 3536 1080 svchost.exe 57 PID 1080 wrote to memory of 3736 1080 svchost.exe 58 PID 1080 wrote to memory of 3872 1080 svchost.exe 59 PID 1080 wrote to memory of 3948 1080 svchost.exe 60 PID 1080 wrote to memory of 4040 1080 svchost.exe 61 PID 1080 wrote to memory of 4156 1080 svchost.exe 62 PID 1080 wrote to memory of 2060 1080 svchost.exe 74 PID 1080 wrote to memory of 112 1080 svchost.exe 76 PID 1080 wrote to memory of 532 1080 svchost.exe 81 PID 1080 wrote to memory of 3496 1080 svchost.exe 83 PID 1080 wrote to memory of 3496 1080 svchost.exe 83 PID 1080 wrote to memory of 2876 1080 svchost.exe 84 PID 1080 wrote to memory of 4640 1080 svchost.exe 86 PID 1080 wrote to memory of 4640 1080 svchost.exe 86 PID 1080 wrote to memory of 4640 1080 svchost.exe 86 PID 1080 wrote to memory of 2224 1080 svchost.exe 87 PID 1080 wrote to memory of 2224 1080 svchost.exe 87 PID 1080 wrote to memory of 2224 1080 svchost.exe 87 PID 1080 wrote to memory of 776 1080 svchost.exe 8 PID 1080 wrote to memory of 780 1080 svchost.exe 9 PID 1080 wrote to memory of 1016 1080 svchost.exe 13 PID 1080 wrote to memory of 2852 1080 svchost.exe 49 PID 1080 wrote to memory of 2884 1080 svchost.exe 50 PID 1080 wrote to memory of 2156 1080 svchost.exe 52 PID 1080 wrote to memory of 3432 1080 svchost.exe 56 PID 1080 wrote to memory of 3536 1080 svchost.exe 57 PID 1080 wrote to memory of 3736 1080 svchost.exe 58 PID 1080 wrote to memory of 3872 1080 svchost.exe 59 PID 1080 wrote to memory of 3948 1080 svchost.exe 60 PID 1080 wrote to memory of 4040 1080 svchost.exe 61 PID 1080 wrote to memory of 4156 1080 svchost.exe 62 PID 1080 wrote to memory of 2060 1080 svchost.exe 74 PID 1080 wrote to memory of 112 1080 svchost.exe 76 PID 1080 wrote to memory of 532 1080 svchost.exe 81 PID 1080 wrote to memory of 4640 1080 svchost.exe 86 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Global.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" Global.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" 53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1016
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2884
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe"C:\Users\Admin\AppData\Local\Temp\53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Modifies system executable filetype association
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4816 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe"3⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3496 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1080 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"5⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4640
-
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"5⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2224
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3536
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3736
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3872
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3948
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4040
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4156
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2060
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:112
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:532
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e72c9789ac7232e3b36766eb2a8f8da6
SHA1a37a9f18e227d103bb4e1ecac0834c2cdf99d112
SHA2567b03603cbc56105470b4bfb250d0ef18fa93126475e2872d63dc52c35866d2a9
SHA512666a2592c5303a1f42a8bbddc2a8e5d3289c612be7401e3530a3afd70d8243276645bad00a82f3254674307583dabae49c16204e790200a34b0707813265f6d0
-
Filesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
Filesize
576KB
MD5e75eb7ec59b063d003c27d6a7beb0cb0
SHA1fd6b271010e01f5a63766dfabc23d96eb6cabdc8
SHA25653824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849
SHA5126ec26ad4969758a619dba4755fd92c035d790cbcf7ce795daf647c54e9e3c074ee706b2505780f956d48a9fbc0c4c8fe7106974a0a4898e24820aee625899ad0
-
Filesize
257B
MD509639307997754c36302500997abe0aa
SHA1a64f712468d8f14780ca68835ad96e432b000f09
SHA256d2e703f2375b75c07603de71c01faa88eeca9cbdbf4c5dbe5869ccb0e9db7d0c
SHA51243cd7bfc0b5f449e3811f14bd578845671fc7187831ae664078f6be778758d232fee3bf60b29b97e0e0e5a8120e001698950843e10764ab7dff242a711da40db