Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
02-12-2021 07:36
Behavioral task
behavioral1
Sample
705f67dccd4c352a37b7eb04293f3e4c.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
General
-
Target
705f67dccd4c352a37b7eb04293f3e4c.exe
-
Size
31KB
-
MD5
705f67dccd4c352a37b7eb04293f3e4c
-
SHA1
1c5f8403e9ac0874e3f75f8b038b2f1b4ac7e64e
-
SHA256
ef9c82bb0f96b6266672941cce875b59d431c7f3af89901a8c23ee813293823d
-
SHA512
c1df9719ffde323313c014a23bcb4ebb921b179669768ce2a63e6ea2de10e946bee1e268c4196dce07e50c9f3b8efa72a92e13055d71e57931ab8acfb2fac19f
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
705f67dccd4c352a37b7eb04293f3e4c.exedescription pid process Token: SeDebugPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: 33 2144 705f67dccd4c352a37b7eb04293f3e4c.exe Token: SeIncBasePriorityPrivilege 2144 705f67dccd4c352a37b7eb04293f3e4c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
705f67dccd4c352a37b7eb04293f3e4c.exedescription pid process target process PID 2144 wrote to memory of 3448 2144 705f67dccd4c352a37b7eb04293f3e4c.exe netsh.exe PID 2144 wrote to memory of 3448 2144 705f67dccd4c352a37b7eb04293f3e4c.exe netsh.exe PID 2144 wrote to memory of 3448 2144 705f67dccd4c352a37b7eb04293f3e4c.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\705f67dccd4c352a37b7eb04293f3e4c.exe"C:\Users\Admin\AppData\Local\Temp\705f67dccd4c352a37b7eb04293f3e4c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\705f67dccd4c352a37b7eb04293f3e4c.exe" "705f67dccd4c352a37b7eb04293f3e4c.exe" ENABLE2⤵PID:3448