Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-12-2021 16:48
Behavioral task
behavioral1
Sample
223fe0971e3093c48957b34f5f7e5d57.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
223fe0971e3093c48957b34f5f7e5d57.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
223fe0971e3093c48957b34f5f7e5d57.exe
-
Size
93KB
-
MD5
223fe0971e3093c48957b34f5f7e5d57
-
SHA1
1355cb6ddd9d1f6098cc48f683d154c46cd61a64
-
SHA256
4f26208a480c3c01ee313f6b8fa9f6e132ec02ab3e179600f0bb965f97cb610d
-
SHA512
ad00da9253642f35e5d8f9359cb00ed0d3557f09c1db333cdb3ac2d1b7c726ad0194363c8920cd959885087e7b8771742e2a3b907de5724f04eb15212787f850
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 4 IoCs
Processes:
223fe0971e3093c48957b34f5f7e5d57.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe 223fe0971e3093c48957b34f5f7e5d57.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe 223fe0971e3093c48957b34f5f7e5d57.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c4e37f67d0a340cd60341394ef726096Windows Update.exe 223fe0971e3093c48957b34f5f7e5d57.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c4e37f67d0a340cd60341394ef726096Windows Update.exe 223fe0971e3093c48957b34f5f7e5d57.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory 2 IoCs
Processes:
223fe0971e3093c48957b34f5f7e5d57.exedescription ioc process File created C:\Windows\SysWOW64\Explower.exe 223fe0971e3093c48957b34f5f7e5d57.exe File opened for modification C:\Windows\SysWOW64\Explower.exe 223fe0971e3093c48957b34f5f7e5d57.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
223fe0971e3093c48957b34f5f7e5d57.exepid process 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe 1940 223fe0971e3093c48957b34f5f7e5d57.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
223fe0971e3093c48957b34f5f7e5d57.exepid process 1940 223fe0971e3093c48957b34f5f7e5d57.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
223fe0971e3093c48957b34f5f7e5d57.exedescription pid process Token: SeDebugPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: 33 1940 223fe0971e3093c48957b34f5f7e5d57.exe Token: SeIncBasePriorityPrivilege 1940 223fe0971e3093c48957b34f5f7e5d57.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
223fe0971e3093c48957b34f5f7e5d57.exedescription pid process target process PID 1940 wrote to memory of 476 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 476 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 476 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 476 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 2012 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 2012 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 2012 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 2012 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 1184 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 1184 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 1184 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe PID 1940 wrote to memory of 1184 1940 223fe0971e3093c48957b34f5f7e5d57.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\223fe0971e3093c48957b34f5f7e5d57.exe"C:\Users\Admin\AppData\Local\Temp\223fe0971e3093c48957b34f5f7e5d57.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\223fe0971e3093c48957b34f5f7e5d57.exe" "223fe0971e3093c48957b34f5f7e5d57.exe" ENABLE2⤵PID:476
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\223fe0971e3093c48957b34f5f7e5d57.exe"2⤵PID:2012
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\223fe0971e3093c48957b34f5f7e5d57.exe" "223fe0971e3093c48957b34f5f7e5d57.exe" ENABLE2⤵PID:1184