Analysis
-
max time kernel
25s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 10:07
Behavioral task
behavioral1
Sample
b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe
Resource
win7-20241010-en
General
-
Target
b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe
-
Size
708KB
-
MD5
f9e4b8c0996aadb81b69c9a93ebba2b0
-
SHA1
fa85ca1759a704fd1cafe8777d6877f5deef3743
-
SHA256
b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287d
-
SHA512
4c5484859607f1af5771de029585cf2502f13b0cdf4ab298a4582454f8529719ec774af9168eedcaa0774ecc588bd2e90bbc1acc1c4294803f322e299487e142
-
SSDEEP
12288:7qU89vzAaKUaQqbWQrPBFSHvkJO1tmPY+QL2TFDhvfo:svzrpEWQ7zmvFYQL2FNw
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/memory/1740-0-0x0000000000400000-0x000000000042D000-memory.dmp family_neshta behavioral1/files/0x000700000001938e-6.dat family_neshta behavioral1/memory/1740-149-0x0000000000400000-0x000000000042D000-memory.dmp family_neshta behavioral1/memory/1740-181-0x0000000000400000-0x000000000042D000-memory.dmp family_neshta behavioral1/memory/1740-272-0x0000000000400000-0x000000000042D000-memory.dmp family_neshta -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2848 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 3020 Un_A.exe -
Loads dropped DLL 7 IoCs
pid Process 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 2848 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 3020 Un_A.exe 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 3020 Un_A.exe 3020 Un_A.exe 3020 Un_A.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
resource yara_rule behavioral1/memory/1740-9-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-4-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-13-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-17-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-16-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-15-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-14-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-12-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-11-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-18-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-21-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-20-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-45-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-55-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-84-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-124-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-125-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-140-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-139-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-150-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-154-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-179-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/1740-273-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe File opened for modification C:\Windows\svchost.com b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe Token: SeDebugPrivilege 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 Un_A.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1108 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 19 PID 1740 wrote to memory of 1168 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 20 PID 1740 wrote to memory of 1204 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 21 PID 1740 wrote to memory of 844 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 23 PID 1740 wrote to memory of 2848 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 30 PID 1740 wrote to memory of 2848 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 30 PID 1740 wrote to memory of 2848 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 30 PID 1740 wrote to memory of 2848 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 30 PID 2848 wrote to memory of 3020 2848 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 31 PID 2848 wrote to memory of 3020 2848 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 31 PID 2848 wrote to memory of 3020 2848 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 31 PID 2848 wrote to memory of 3020 2848 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 31 PID 1740 wrote to memory of 1108 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 19 PID 1740 wrote to memory of 1168 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 20 PID 1740 wrote to memory of 1204 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 21 PID 1740 wrote to memory of 844 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 23 PID 1740 wrote to memory of 3020 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 31 PID 1740 wrote to memory of 3020 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 31 PID 1740 wrote to memory of 1108 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 19 PID 1740 wrote to memory of 1168 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 20 PID 1740 wrote to memory of 1204 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 21 PID 1740 wrote to memory of 844 1740 b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe 23 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe"C:\Users\Admin\AppData\Local\Temp\b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\3582-490\4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3020
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:844
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0F7688DF_Rar\b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe
Filesize636KB
MD5e5bdd939dc6828ae594924ca3c412de7
SHA1485a4b10130aba2ee7b7b56e32e30a057b1e7ce1
SHA2569874a5d03de96b51f58bb519c3078229a0a2ea125a53ea99fdca25d8cfa981b8
SHA512d9cac72410c6af62b4f736679f4e3cc40d9167ae7053c2b31a11b47cdf0a73e60184813f335079aa095e67817ec8f517fce6810cad458d7a85a4032ae0b03a7c
-
C:\Users\Admin\AppData\Local\Temp\3582-490\b91d629f3b3f5c4ec1d2daa9f39ad57233d088e3bc5391a5b9ea1cf0b9a2287dN.exe
Filesize596KB
MD5e412b724c184019372091156991f25d7
SHA171e0ae3fa7db2568365c7eac5dd982c0dad23eae
SHA256aa48ff7c848a2631d823b6e1696c147509a601d813a8f7268d3b621b78933ce9
SHA512c6d0c8339f41d29c04ff0eec376abf574be22b5a7e60bbc3c3969f1d50e018f250cf9013e142170c117d4fe2945462d1d3ef3191fa6fa28a4032debf179aa973
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
5KB
MD530b091668111ab1d6c19f16586a9eee5
SHA1aea49d81cf9972eaf1604793c04d13ddffe2c475
SHA256331ca4b3a311324b463167ec43851146e57a2d90500ac3fd57a7683f6b777ffb
SHA5126dd592af085b2e28c54d7f525916112dbf5cfe134393b0b97f8f1f64739cf90962273c51f02e8ce2c623cf6aa8355eacda5db0b0256d8f05a77ccf0f99d11648
-
Filesize
99KB
MD57abf66bab64e83da7a4da626bc34493a
SHA1c3adab85d079b75b0c46f6b25fd2a736687624c5
SHA256cbe5843990076d7cda9fe83aa305d66d3a0ffdcca932ef23114d1b3a491924f9
SHA512f1beeb7df3e24daa72bdb093ea655d236c601e55f039322676f80c8aace0d39af6fab78be6b6b63e9486473f78dae42a762022f776b55d118c7a20948990dd5e
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b
-
Filesize
2KB
MD59a3031cc4cef0dba236a28eecdf0afb5
SHA1708a76aa56f77f1b0ebc62b023163c2e0426f3ac
SHA25653bb519e3293164947ac7cbd7e612f637d77a7b863e3534ba1a7e39b350d3c00
SHA5128fddde526e7d10d77e247ea80b273beae9dde1d4112806f1f5c3e6a409247d54d8a4445ab5bdd77025a434c3d1dcfdf480dac21abbdb13a308d5eb74517fab53