Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 21:01
Static task
static1
Behavioral task
behavioral1
Sample
1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe
Resource
win10v2004-20241007-en
General
-
Target
1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe
-
Size
1020KB
-
MD5
99c377c6e1d03d1d748eb2db3372fa3c
-
SHA1
ca53f8b9d678246cf65c184049544323a6be459e
-
SHA256
1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa
-
SHA512
b0e90e50659b26d0aa6943bf9d11ef81c4092a96bb9aa92e11cbe72961869bb52016af037e6e2efa9d433d42c1476af91d2f9824f515b50397dfb2d63516137f
-
SSDEEP
24576:jIgF5uTsEwKJq2lHpmsqYASpF2V7nrZ6MxbfMXaPs3fv68kj:8giTW2dpRjf21hxb0XaKfv6Hj
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 6 IoCs
resource yara_rule behavioral1/memory/2904-22-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2904-33-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2904-34-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2904-35-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2904-36-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2904-38-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\EtNDuISBB.dll 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe File opened for modification C:\Windows\SysWOW64\EtNDuISBB.dll 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2680 set thread context of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2428 set thread context of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 -
resource yara_rule behavioral1/memory/2904-22-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2904-20-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2904-17-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2904-33-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2904-34-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2904-35-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2904-36-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2904-38-0x0000000000400000-0x0000000000474000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2956 reg.exe 2772 reg.exe 2736 reg.exe 2648 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeCreateTokenPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeAssignPrimaryTokenPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeLockMemoryPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeIncreaseQuotaPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeMachineAccountPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeTcbPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeSecurityPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeTakeOwnershipPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeLoadDriverPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeSystemProfilePrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeSystemtimePrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeProfSingleProcessPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeIncBasePriorityPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeCreatePagefilePrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeCreatePermanentPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeBackupPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeRestorePrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeShutdownPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeDebugPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeAuditPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeSystemEnvironmentPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeChangeNotifyPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeRemoteShutdownPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeUndockPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeSyncAgentPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeEnableDelegationPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeManageVolumePrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeImpersonatePrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeCreateGlobalPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: 31 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: 32 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: 33 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: 34 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: 35 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe Token: SeDebugPrivilege 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2680 wrote to memory of 2428 2680 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 30 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2428 wrote to memory of 2904 2428 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 31 PID 2904 wrote to memory of 3016 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 32 PID 2904 wrote to memory of 3016 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 32 PID 2904 wrote to memory of 3016 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 32 PID 2904 wrote to memory of 3016 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 32 PID 2904 wrote to memory of 2752 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 33 PID 2904 wrote to memory of 2752 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 33 PID 2904 wrote to memory of 2752 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 33 PID 2904 wrote to memory of 2752 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 33 PID 2904 wrote to memory of 2704 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 34 PID 2904 wrote to memory of 2704 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 34 PID 2904 wrote to memory of 2704 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 34 PID 2904 wrote to memory of 2704 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 34 PID 2904 wrote to memory of 2708 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 35 PID 2904 wrote to memory of 2708 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 35 PID 2904 wrote to memory of 2708 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 35 PID 2904 wrote to memory of 2708 2904 1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe 35 PID 2704 wrote to memory of 2956 2704 cmd.exe 40 PID 2704 wrote to memory of 2956 2704 cmd.exe 40 PID 2704 wrote to memory of 2956 2704 cmd.exe 40 PID 2704 wrote to memory of 2956 2704 cmd.exe 40 PID 2752 wrote to memory of 2772 2752 cmd.exe 41 PID 2752 wrote to memory of 2772 2752 cmd.exe 41 PID 2752 wrote to memory of 2772 2752 cmd.exe 41 PID 2752 wrote to memory of 2772 2752 cmd.exe 41 PID 2708 wrote to memory of 2736 2708 cmd.exe 42 PID 2708 wrote to memory of 2736 2708 cmd.exe 42 PID 2708 wrote to memory of 2736 2708 cmd.exe 42 PID 2708 wrote to memory of 2736 2708 cmd.exe 42 PID 3016 wrote to memory of 2648 3016 cmd.exe 43 PID 3016 wrote to memory of 2648 3016 cmd.exe 43 PID 3016 wrote to memory of 2648 3016 cmd.exe 43 PID 3016 wrote to memory of 2648 3016 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe"C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exeC:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exeC:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2736
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD588f8ae3b5c5c8628aa2e3fba90c427cb
SHA127a8622d61d85b7acd809463846db4175979fedc
SHA256f585bd74a740303b003f88480d9ca8c04f1e3cabdb04fdda7c73e66e70aff25c
SHA51260181e12386dd051d9edb68498560d1aaf02ccc158459d680c7e691e5d6e28a9feb005ecedff442d597dc5b9efe64d36b6444af3f020dd178e8833411ea6d1dc
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606