Analysis
-
max time kernel
40s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
17982cc741232f395fe8ea0af191c1611acfdf37da04287f856d3320e8e911a4.dll
Resource
win7-20240419-en
General
-
Target
17982cc741232f395fe8ea0af191c1611acfdf37da04287f856d3320e8e911a4.dll
-
Size
120KB
-
MD5
2b2ac9be7a44039d34768997c6d980b5
-
SHA1
958b528b852fd47f3699408a8243b83916a52a2f
-
SHA256
17982cc741232f395fe8ea0af191c1611acfdf37da04287f856d3320e8e911a4
-
SHA512
de5fd1aaf691de211cca466e47f9c49fee4172971e01a854cf706a7d61a5190035ace089a93f23ebde8587bf4f501eaeba0201ad9bcccc5ed6c10629bf4451fc
-
SSDEEP
1536:pvUcqa0ZDPai0be2H6dP/zSLonTec3bWZADyLG7pRmRUkttHJ3VdLcFhqKcbkCoq:pg90/6J/ogT4Z+yLG7/24FHeV
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
e5749ea.exee5765af.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5765af.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5765af.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e5749ea.exe -
Processes:
e5749ea.exee5765af.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5765af.exe -
Processes:
e5749ea.exee5765af.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5765af.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 32 IoCs
Processes:
resource yara_rule behavioral2/memory/4440-6-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-10-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-19-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-18-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-32-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-27-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-12-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-26-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-11-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-9-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-36-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-37-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-38-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-39-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-40-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-42-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-43-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-52-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-54-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-55-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-66-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-67-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-70-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-72-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-74-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-76-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-78-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-80-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-82-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4440-92-0x0000000000870000-0x000000000192A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/904-114-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/904-109-0x0000000000B30000-0x0000000001BEA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 36 IoCs
Processes:
resource yara_rule behavioral2/memory/4440-5-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4440-6-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-10-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-19-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-18-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-32-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-27-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-12-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-26-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-11-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-9-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-36-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-37-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-38-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-39-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-40-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-42-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-43-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-52-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-54-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-55-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-66-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-67-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-70-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-72-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-74-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-76-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-78-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-80-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-82-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-92-0x0000000000870000-0x000000000192A000-memory.dmp UPX behavioral2/memory/4440-102-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/4328-106-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/904-113-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral2/memory/904-114-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX behavioral2/memory/904-109-0x0000000000B30000-0x0000000001BEA000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
e5749ea.exee574b70.exee5765af.exepid process 4440 e5749ea.exe 4328 e574b70.exe 904 e5765af.exe -
Processes:
resource yara_rule behavioral2/memory/4440-6-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-10-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-19-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-18-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-32-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-27-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-12-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-26-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-11-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-9-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-36-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-37-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-38-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-39-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-40-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-42-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-43-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-52-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-54-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-55-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-66-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-67-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-70-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-72-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-74-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-76-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-78-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-80-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-82-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/4440-92-0x0000000000870000-0x000000000192A000-memory.dmp upx behavioral2/memory/904-114-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx behavioral2/memory/904-109-0x0000000000B30000-0x0000000001BEA000-memory.dmp upx -
Processes:
e5749ea.exee5765af.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5749ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e5765af.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e5765af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e5765af.exe -
Processes:
e5749ea.exee5765af.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5765af.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e5749ea.exedescription ioc process File opened (read-only) \??\I: e5749ea.exe File opened (read-only) \??\J: e5749ea.exe File opened (read-only) \??\L: e5749ea.exe File opened (read-only) \??\K: e5749ea.exe File opened (read-only) \??\Q: e5749ea.exe File opened (read-only) \??\S: e5749ea.exe File opened (read-only) \??\E: e5749ea.exe File opened (read-only) \??\G: e5749ea.exe File opened (read-only) \??\N: e5749ea.exe File opened (read-only) \??\H: e5749ea.exe File opened (read-only) \??\M: e5749ea.exe File opened (read-only) \??\O: e5749ea.exe File opened (read-only) \??\P: e5749ea.exe File opened (read-only) \??\R: e5749ea.exe -
Drops file in Program Files directory 4 IoCs
Processes:
e5749ea.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Uninstall.exe e5749ea.exe File opened for modification C:\Program Files\7-Zip\7z.exe e5749ea.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e5749ea.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e5749ea.exe -
Drops file in Windows directory 3 IoCs
Processes:
e5749ea.exee5765af.exedescription ioc process File created C:\Windows\e574a38 e5749ea.exe File opened for modification C:\Windows\SYSTEM.INI e5749ea.exe File created C:\Windows\e57b41d e5765af.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e5749ea.exepid process 4440 e5749ea.exe 4440 e5749ea.exe 4440 e5749ea.exe 4440 e5749ea.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e5749ea.exedescription pid process Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe Token: SeDebugPrivilege 4440 e5749ea.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
rundll32.exerundll32.exee5749ea.exedescription pid process target process PID 1392 wrote to memory of 4764 1392 rundll32.exe rundll32.exe PID 1392 wrote to memory of 4764 1392 rundll32.exe rundll32.exe PID 1392 wrote to memory of 4764 1392 rundll32.exe rundll32.exe PID 4764 wrote to memory of 4440 4764 rundll32.exe e5749ea.exe PID 4764 wrote to memory of 4440 4764 rundll32.exe e5749ea.exe PID 4764 wrote to memory of 4440 4764 rundll32.exe e5749ea.exe PID 4440 wrote to memory of 780 4440 e5749ea.exe fontdrvhost.exe PID 4440 wrote to memory of 788 4440 e5749ea.exe fontdrvhost.exe PID 4440 wrote to memory of 336 4440 e5749ea.exe dwm.exe PID 4440 wrote to memory of 2520 4440 e5749ea.exe sihost.exe PID 4440 wrote to memory of 2532 4440 e5749ea.exe svchost.exe PID 4440 wrote to memory of 2692 4440 e5749ea.exe taskhostw.exe PID 4440 wrote to memory of 3360 4440 e5749ea.exe Explorer.EXE PID 4440 wrote to memory of 3648 4440 e5749ea.exe svchost.exe PID 4440 wrote to memory of 3852 4440 e5749ea.exe DllHost.exe PID 4440 wrote to memory of 3952 4440 e5749ea.exe StartMenuExperienceHost.exe PID 4440 wrote to memory of 4012 4440 e5749ea.exe RuntimeBroker.exe PID 4440 wrote to memory of 3116 4440 e5749ea.exe SearchApp.exe PID 4440 wrote to memory of 4160 4440 e5749ea.exe RuntimeBroker.exe PID 4440 wrote to memory of 4548 4440 e5749ea.exe RuntimeBroker.exe PID 4440 wrote to memory of 3764 4440 e5749ea.exe TextInputHost.exe PID 4440 wrote to memory of 1392 4440 e5749ea.exe rundll32.exe PID 4440 wrote to memory of 4764 4440 e5749ea.exe rundll32.exe PID 4440 wrote to memory of 4764 4440 e5749ea.exe rundll32.exe PID 4764 wrote to memory of 4328 4764 rundll32.exe e574b70.exe PID 4764 wrote to memory of 4328 4764 rundll32.exe e574b70.exe PID 4764 wrote to memory of 4328 4764 rundll32.exe e574b70.exe PID 4764 wrote to memory of 904 4764 rundll32.exe e5765af.exe PID 4764 wrote to memory of 904 4764 rundll32.exe e5765af.exe PID 4764 wrote to memory of 904 4764 rundll32.exe e5765af.exe PID 4440 wrote to memory of 780 4440 e5749ea.exe fontdrvhost.exe PID 4440 wrote to memory of 788 4440 e5749ea.exe fontdrvhost.exe PID 4440 wrote to memory of 336 4440 e5749ea.exe dwm.exe PID 4440 wrote to memory of 2520 4440 e5749ea.exe sihost.exe PID 4440 wrote to memory of 2532 4440 e5749ea.exe svchost.exe PID 4440 wrote to memory of 2692 4440 e5749ea.exe taskhostw.exe PID 4440 wrote to memory of 3360 4440 e5749ea.exe Explorer.EXE PID 4440 wrote to memory of 3648 4440 e5749ea.exe svchost.exe PID 4440 wrote to memory of 3852 4440 e5749ea.exe DllHost.exe PID 4440 wrote to memory of 3952 4440 e5749ea.exe StartMenuExperienceHost.exe PID 4440 wrote to memory of 4012 4440 e5749ea.exe RuntimeBroker.exe PID 4440 wrote to memory of 3116 4440 e5749ea.exe SearchApp.exe PID 4440 wrote to memory of 4160 4440 e5749ea.exe RuntimeBroker.exe PID 4440 wrote to memory of 4548 4440 e5749ea.exe RuntimeBroker.exe PID 4440 wrote to memory of 3764 4440 e5749ea.exe TextInputHost.exe PID 4440 wrote to memory of 4328 4440 e5749ea.exe e574b70.exe PID 4440 wrote to memory of 4328 4440 e5749ea.exe e574b70.exe PID 4440 wrote to memory of 904 4440 e5749ea.exe e5765af.exe PID 4440 wrote to memory of 904 4440 e5749ea.exe e5765af.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e5749ea.exee5765af.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5749ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5765af.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17982cc741232f395fe8ea0af191c1611acfdf37da04287f856d3320e8e911a4.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17982cc741232f395fe8ea0af191c1611acfdf37da04287f856d3320e8e911a4.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e5749ea.exeC:\Users\Admin\AppData\Local\Temp\e5749ea.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e574b70.exeC:\Users\Admin\AppData\Local\Temp\e574b70.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e5765af.exeC:\Users\Admin\AppData\Local\Temp\e5765af.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e5749ea.exeFilesize
97KB
MD5d23dc0dbe30f9197398ee37b27897dd7
SHA134ff02d57afbc19ed2691cb4fe7796d2e2a6652c
SHA256dce90f408e745603cdd91e86d5f848ef771d96b962ed05e58262a42db2020520
SHA51295e8e05c4615d13b599fb23ddbcc4371c8e647b38045e82d8fd83f20758cdf6097feb3f02b37cc30b915801090076135dcd745fc5657c16707a13fe7de5c3fb5
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5c8a73f75c2145b8639ba132c17c5365e
SHA18758e47e0a0535fdc5826d9a7138d031b9ffbfc7
SHA25693ca875d32952ecd1ca25d4de8c382dc284b4bb0207e03670b3a8bb4cb011db5
SHA51243ab752433b1fb7857291ff302e4698a1146fb59e2a3503c5be99244dc2e92b6ec2ef1f9fd7eb33bc67e957fc231edbc09b77d91849dd76ea1868e978bff8f21
-
memory/904-60-0x0000000000460000-0x0000000000461000-memory.dmpFilesize
4KB
-
memory/904-109-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/904-114-0x0000000000B30000-0x0000000001BEA000-memory.dmpFilesize
16.7MB
-
memory/904-113-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/904-62-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/904-64-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/904-51-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4328-106-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4328-58-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4328-61-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4328-35-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4328-63-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/4440-42-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-27-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4440-6-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-10-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-11-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-9-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-36-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-37-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-38-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-39-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-40-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-19-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-43-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-23-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/4440-52-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-54-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-55-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-26-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-12-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-31-0x00000000005A0000-0x00000000005A2000-memory.dmpFilesize
8KB
-
memory/4440-91-0x00000000005A0000-0x00000000005A2000-memory.dmpFilesize
8KB
-
memory/4440-32-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-18-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-66-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-67-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-70-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-72-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-74-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-76-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-78-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-80-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-82-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-92-0x0000000000870000-0x000000000192A000-memory.dmpFilesize
16.7MB
-
memory/4440-102-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4440-28-0x00000000005A0000-0x00000000005A2000-memory.dmpFilesize
8KB
-
memory/4764-30-0x00000000007C0000-0x00000000007C2000-memory.dmpFilesize
8KB
-
memory/4764-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/4764-20-0x00000000007C0000-0x00000000007C2000-memory.dmpFilesize
8KB
-
memory/4764-21-0x00000000007E0000-0x00000000007E1000-memory.dmpFilesize
4KB
-
memory/4764-24-0x00000000007C0000-0x00000000007C2000-memory.dmpFilesize
8KB