Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 06:06
Static task
static1
Behavioral task
behavioral1
Sample
0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe
Resource
win10v2004-20250129-en
General
-
Target
0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe
-
Size
3.4MB
-
MD5
5a44d55977279dea261cbad06f84d66f
-
SHA1
022593b1487db6544d4d179698b8e618aea1ce53
-
SHA256
0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea
-
SHA512
7aab6db7bbaf2c8138d00587ade4df87ec4d9ebea40c0cbafaba04fc4510062112c1ae91abcdd6fa522bb3c3dab68cd4e4cb3ad7b8e07f972b1b38f23226e6dc
-
SSDEEP
98304:LQOH5ra31GoHKqUifIwY/L4a3X62BcFOg/9MRhM6+bajaQPl:LHMBHKqUaS/LO2BM9MDMFfQPl
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Windows security modification 2 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Enumerates connected drives 3 TTPs 5 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe File opened (read-only) \??\G: 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe File opened (read-only) \??\H: 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe File opened (read-only) \??\I: 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe File opened (read-only) \??\J: 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
resource yara_rule behavioral1/memory/2660-11-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-2-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-9-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-12-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-0-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-13-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-6-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-15-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-16-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-14-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-47-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-46-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-49-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-50-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-51-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-56-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-57-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-58-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-79-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-81-0x0000000002730000-0x00000000037EA000-memory.dmp upx behavioral1/memory/2660-105-0x0000000002730000-0x00000000037EA000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe File created C:\Windows\f76fb5f 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1872 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe Token: SeDebugPrivilege 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1128 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 19 PID 2660 wrote to memory of 1184 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 20 PID 2660 wrote to memory of 1260 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 21 PID 2660 wrote to memory of 1544 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 25 PID 2660 wrote to memory of 2612 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 30 PID 2660 wrote to memory of 2612 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 30 PID 2660 wrote to memory of 2612 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 30 PID 2660 wrote to memory of 2612 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 30 PID 2612 wrote to memory of 1004 2612 cmd.exe 32 PID 2612 wrote to memory of 1004 2612 cmd.exe 32 PID 2612 wrote to memory of 1004 2612 cmd.exe 32 PID 2612 wrote to memory of 1004 2612 cmd.exe 32 PID 1004 wrote to memory of 2992 1004 net.exe 33 PID 1004 wrote to memory of 2992 1004 net.exe 33 PID 1004 wrote to memory of 2992 1004 net.exe 33 PID 1004 wrote to memory of 2992 1004 net.exe 33 PID 2612 wrote to memory of 1716 2612 cmd.exe 34 PID 2612 wrote to memory of 1716 2612 cmd.exe 34 PID 2612 wrote to memory of 1716 2612 cmd.exe 34 PID 2612 wrote to memory of 1716 2612 cmd.exe 34 PID 1716 wrote to memory of 2880 1716 net.exe 35 PID 1716 wrote to memory of 2880 1716 net.exe 35 PID 1716 wrote to memory of 2880 1716 net.exe 35 PID 1716 wrote to memory of 2880 1716 net.exe 35 PID 2612 wrote to memory of 2964 2612 cmd.exe 36 PID 2612 wrote to memory of 2964 2612 cmd.exe 36 PID 2612 wrote to memory of 2964 2612 cmd.exe 36 PID 2612 wrote to memory of 2964 2612 cmd.exe 36 PID 2612 wrote to memory of 1172 2612 cmd.exe 37 PID 2612 wrote to memory of 1172 2612 cmd.exe 37 PID 2612 wrote to memory of 1172 2612 cmd.exe 37 PID 2612 wrote to memory of 1172 2612 cmd.exe 37 PID 1172 wrote to memory of 2128 1172 net.exe 38 PID 1172 wrote to memory of 2128 1172 net.exe 38 PID 1172 wrote to memory of 2128 1172 net.exe 38 PID 1172 wrote to memory of 2128 1172 net.exe 38 PID 2612 wrote to memory of 1824 2612 cmd.exe 39 PID 2612 wrote to memory of 1824 2612 cmd.exe 39 PID 2612 wrote to memory of 1824 2612 cmd.exe 39 PID 2612 wrote to memory of 1824 2612 cmd.exe 39 PID 1824 wrote to memory of 2532 1824 net.exe 40 PID 1824 wrote to memory of 2532 1824 net.exe 40 PID 1824 wrote to memory of 2532 1824 net.exe 40 PID 1824 wrote to memory of 2532 1824 net.exe 40 PID 2612 wrote to memory of 1872 2612 cmd.exe 41 PID 2612 wrote to memory of 1872 2612 cmd.exe 41 PID 2612 wrote to memory of 1872 2612 cmd.exe 41 PID 2612 wrote to memory of 1872 2612 cmd.exe 41 PID 2660 wrote to memory of 1308 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 42 PID 2660 wrote to memory of 1308 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 42 PID 2660 wrote to memory of 1308 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 42 PID 2660 wrote to memory of 1308 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 42 PID 1308 wrote to memory of 1704 1308 net.exe 44 PID 1308 wrote to memory of 1704 1308 net.exe 44 PID 1308 wrote to memory of 1704 1308 net.exe 44 PID 1308 wrote to memory of 1704 1308 net.exe 44 PID 2660 wrote to memory of 2088 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 45 PID 2660 wrote to memory of 2088 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 45 PID 2660 wrote to memory of 2088 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 45 PID 2660 wrote to memory of 2088 2660 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe 45 PID 2088 wrote to memory of 1500 2088 net.exe 47 PID 2088 wrote to memory of 1500 2088 net.exe 47 PID 2088 wrote to memory of 1500 2088 net.exe 47 PID 2088 wrote to memory of 1500 2088 net.exe 47 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe"C:\Users\Admin\AppData\Local\Temp\0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\¿ªÆô¹²Ïí.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\net.exeNET USER Guest /active:yes4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 USER Guest /active:yes5⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Windows\SysWOW64\net.exeNET USER Guest /passwordreq:no4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 USER Guest /passwordreq:no5⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Windows\SysWOW64\SecEdit.exeSecedit /configure /cfg "security.inf" /db secsetup.sdb /areas USER_RIGHTS /verbose4⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\net.exenet user guest /active:yes4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user guest /active:yes5⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
-
C:\Windows\SysWOW64\net.exenet user guest ""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user guest ""5⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s ┐¬╞⌠╣▓╧φ.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1872
-
-
-
C:\Windows\SysWOW64\net.exenet start workstation3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start workstation4⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
C:\Windows\SysWOW64\net.exenet start "Computer Browser"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Computer Browser"4⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Windows\SysWOW64\net.exenet start server3⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start server4⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Windows\SysWOW64\net.exenet start netbios3⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start netbios4⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\SysWOW64\net.exenet share ±¾µØ£¨CÅÌ)=C:\ /grant:Guests,full /grant:Everyone,full3⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share ±¾µØ£¨CÅÌ)=C:\ /grant:Guests,full /grant:Everyone,full4⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
C:\Windows\SysWOW64\net.exenet share ±¾µØ£¨DÅÌ)=D:\ /grant:Guests,full /grant:Everyone,full3⤵
- System Location Discovery: System Language Discovery
PID:1072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share ±¾µØ£¨DÅÌ)=D:\ /grant:Guests,full /grant:Everyone,full4⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
C:\Windows\SysWOW64\net.exenet share ±¾µØ£¨FÅÌ)=F:\ /grant:Guests,full /grant:Everyone,full3⤵
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share ±¾µØ£¨FÅÌ)=F:\ /grant:Guests,full /grant:Everyone,full4⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\net.exenet share ÎïÀíÖ÷»ú×ÀÃæ=C:\Users\Admin\Desktop /grant:Guests,full /grant:Everyone,full3⤵
- System Location Discovery: System Language Discovery
PID:600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share ÎïÀíÖ÷»ú×ÀÃæ=C:\Users\Admin\Desktop /grant:Guests,full /grant:Everyone,full4⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Admin\Desktop /e /t /g everyone:F3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1544
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242B
MD580f0e65f938e3259b19f89241858ae23
SHA1f6d463a58007cc20b70988563c49b3410e68e92b
SHA25649b26f11aa955b7db4acc775b09476638525772c1a09e7c31dfdca19f6973dba
SHA512d51279e860cf401cba03c90d4edea4cfe408725b6a8737cfc3c63110f7f13f63f52ed350c2e79d1a287172d8c77d6a7dc658a1ac1d4867504a886aa108501d95