Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 02:09
Behavioral task
behavioral1
Sample
a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe
Resource
win7-20240903-en
General
-
Target
a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe
-
Size
612KB
-
MD5
ba287c26a6c5cafe168e8ac392381be2
-
SHA1
acabd610f68bd6a288d42916afd0194898f53d75
-
SHA256
a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943
-
SHA512
494166f4872b2b589c85fd36140ca667bb8766dbd65eecfc6ab110a679f581dae243c68cc09f96e32c2a10e7918475a46f1987db731a10e647cde1106d8fdb5f
-
SSDEEP
6144:XNrgqE3QZ4/KjrWFiU6K73uZwUlgWPMOHSSj80i7idui1Yl6ns3hk:2U4/hFis73p1+OGgi7ghk
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/memory/2196-0-0x0000000000400000-0x000000000042C000-memory.dmp family_neshta behavioral1/files/0x000600000001873d-6.dat family_neshta behavioral1/memory/2196-47-0x0000000000400000-0x000000000042C000-memory.dmp family_neshta behavioral1/memory/2196-84-0x0000000000400000-0x000000000042C000-memory.dmp family_neshta behavioral1/memory/2196-214-0x0000000000400000-0x000000000042C000-memory.dmp family_neshta -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Disables Task Manager via registry modification
-
Loads dropped DLL 1 IoCs
pid Process 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
resource yara_rule behavioral1/memory/2196-1-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-16-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-12-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-14-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-17-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-13-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-11-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-10-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-15-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-35-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-34-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-38-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-39-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-40-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-41-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-43-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-45-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-46-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-55-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-56-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-82-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-87-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-120-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-145-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-159-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-162-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2196-215-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe File opened for modification C:\Windows\svchost.com a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe Token: SeDebugPrivilege 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1112 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 19 PID 2196 wrote to memory of 1164 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 20 PID 2196 wrote to memory of 1232 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 21 PID 2196 wrote to memory of 632 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 25 PID 2196 wrote to memory of 1112 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 19 PID 2196 wrote to memory of 1164 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 20 PID 2196 wrote to memory of 1232 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 21 PID 2196 wrote to memory of 632 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 25 PID 2196 wrote to memory of 1112 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 19 PID 2196 wrote to memory of 1164 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 20 PID 2196 wrote to memory of 1232 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 21 PID 2196 wrote to memory of 632 2196 a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe 25 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe"C:\Users\Admin\AppData\Local\Temp\a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2196
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0F76B9BE_Rar\a65cf9ee76d9f146f847f848a9f736ac9fb4444db5bb9c9341a83c38a4ccf943.exe
Filesize544KB
MD5533c91a3ea4e6fb54d40e099538d3b7f
SHA1056e17501aba3480856847ebe266f5e030db8fff
SHA25676c3b4329fff4540fa0fe5c9370f3de924ef60247d00d5d957d8a8abba0a28f8
SHA51289a1ec5a033798bbf0a49b8c4fbfe8ee12726c15578d6e0fd83b4c989da9d77ee9928c7a6ada862c098fa250e944acfd18a1c466f4d72fc216630e7bdb8409ca
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156