Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
20-12-2021 08:47
Behavioral task
behavioral1
Sample
f24a3142eb29d55505a974bae1bfe95b.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f24a3142eb29d55505a974bae1bfe95b.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
f24a3142eb29d55505a974bae1bfe95b.exe
-
Size
93KB
-
MD5
f24a3142eb29d55505a974bae1bfe95b
-
SHA1
c33ef49f46ef14edaec38e45c661f71f5ce03bbf
-
SHA256
dcc82834d21fd38db347368fcc8ebba52d50f3832f5f6f5d368fa84b2faef030
-
SHA512
56f079c8c888918eaa868f4e3972381b61d11a49e397960a8cec12318943b55d604b799a64a6c545a660cc0af0366ff0eb1f5a7591e254c57b0e3b75e6508f85
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
f24a3142eb29d55505a974bae1bfe95b.exepid process 712 f24a3142eb29d55505a974bae1bfe95b.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
f24a3142eb29d55505a974bae1bfe95b.exedescription pid process Token: SeDebugPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: 33 712 f24a3142eb29d55505a974bae1bfe95b.exe Token: SeIncBasePriorityPrivilege 712 f24a3142eb29d55505a974bae1bfe95b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f24a3142eb29d55505a974bae1bfe95b.exedescription pid process target process PID 712 wrote to memory of 3588 712 f24a3142eb29d55505a974bae1bfe95b.exe netsh.exe PID 712 wrote to memory of 3588 712 f24a3142eb29d55505a974bae1bfe95b.exe netsh.exe PID 712 wrote to memory of 3588 712 f24a3142eb29d55505a974bae1bfe95b.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f24a3142eb29d55505a974bae1bfe95b.exe"C:\Users\Admin\AppData\Local\Temp\f24a3142eb29d55505a974bae1bfe95b.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\f24a3142eb29d55505a974bae1bfe95b.exe" "f24a3142eb29d55505a974bae1bfe95b.exe" ENABLE2⤵PID:3588