Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe
Resource
win7-20240903-en
General
-
Target
7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe
-
Size
176KB
-
MD5
2750abd775fc613d582107d5728eb670
-
SHA1
3c0025c853c7f21e13eb04ee7480e094ccfb63d3
-
SHA256
7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1a
-
SHA512
816cbb3f8499222cefa71f29b0ac6ff0b03223f5e2218b79c18ea5900e6ad4d130a8d73996586662ba0b2c22de10986c42d500b697d86e426a4a3d2f70132170
-
SSDEEP
3072:u1qn4NVFS/YK/suBAKdJlR2m+aJLtVFjVynOq7kHK+ExhW/ynEb:NITS/z01KImhpMkXExhW/iEb
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
resource yara_rule behavioral2/memory/1932-4-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-5-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-8-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-3-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-6-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-12-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-7-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-9-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-13-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-16-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-17-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-27-0x00000000021F0000-0x000000000327E000-memory.dmp upx behavioral2/memory/1932-31-0x00000000021F0000-0x000000000327E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe Token: SeDebugPrivilege 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1932 wrote to memory of 796 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 9 PID 1932 wrote to memory of 800 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 10 PID 1932 wrote to memory of 384 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 13 PID 1932 wrote to memory of 2784 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 49 PID 1932 wrote to memory of 2808 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 50 PID 1932 wrote to memory of 3048 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 52 PID 1932 wrote to memory of 3456 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 56 PID 1932 wrote to memory of 3584 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 57 PID 1932 wrote to memory of 3760 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 58 PID 1932 wrote to memory of 3844 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 59 PID 1932 wrote to memory of 3912 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 60 PID 1932 wrote to memory of 3992 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 61 PID 1932 wrote to memory of 3604 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 62 PID 1932 wrote to memory of 4148 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 64 PID 1932 wrote to memory of 5076 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 75 PID 1932 wrote to memory of 2680 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 81 PID 1932 wrote to memory of 3148 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 83 PID 1932 wrote to memory of 3148 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 83 PID 1932 wrote to memory of 3148 1932 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe 83 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:796
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:384
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2808
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3048
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe"C:\Users\Admin\AppData\Local\Temp\7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe-deleter3⤵
- System Location Discovery: System Language Discovery
PID:3148
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3584
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3760
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3844
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3912
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3992
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4148
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:5076
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0E57E753_Rar\7c312b0df081b83f1248c8deac1c5957bd7c97e84e19db0c801be054ff036a1aN.exe
Filesize104KB
MD55b2065fa6f2ec63fe28be26fdb7b0480
SHA1e6d5fde72e7dd1d6581ff6dc05c4d00c795cd760
SHA256e25cadc80ea5163e0f1c6fd703479469d9f23b47ade244fac5f22bcdb01b39bd
SHA51251dcbf8583104754902a9387da0c2efd05b04842ffb043f3d1035940f6c612e8e20259932e0ebf16e1857c6764596017fe7db3736cab62d3d3f62804535a8417