Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
02-12-2021 08:56
Behavioral task
behavioral1
Sample
508dbdf33362da23088dc438a6685681.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
General
-
Target
508dbdf33362da23088dc438a6685681.exe
-
Size
31KB
-
MD5
508dbdf33362da23088dc438a6685681
-
SHA1
33ecad58c258c5cd896027811c6fa0f42564255b
-
SHA256
2e15758b43bd03a317325eeb94461dd3aa146c9db3e6c31b8e9dda441f1ba4b3
-
SHA512
9d643c60e94ec113b78d5dccef135d94b5dc6d5e8896aa44f7997ba8ee8150a5a3999d580fdd4f6e7fcf6e90195859022e4237fbcb073b32d8510fef4c723c6b
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
508dbdf33362da23088dc438a6685681.exedescription pid process Token: SeDebugPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe Token: 33 912 508dbdf33362da23088dc438a6685681.exe Token: SeIncBasePriorityPrivilege 912 508dbdf33362da23088dc438a6685681.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
508dbdf33362da23088dc438a6685681.exedescription pid process target process PID 912 wrote to memory of 3352 912 508dbdf33362da23088dc438a6685681.exe netsh.exe PID 912 wrote to memory of 3352 912 508dbdf33362da23088dc438a6685681.exe netsh.exe PID 912 wrote to memory of 3352 912 508dbdf33362da23088dc438a6685681.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\508dbdf33362da23088dc438a6685681.exe"C:\Users\Admin\AppData\Local\Temp\508dbdf33362da23088dc438a6685681.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\508dbdf33362da23088dc438a6685681.exe" "508dbdf33362da23088dc438a6685681.exe" ENABLE2⤵PID:3352