Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-12-2021 08:48
Behavioral task
behavioral1
Sample
4b8c4cfc220a9a8c79b1e10712fe3f1b.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4b8c4cfc220a9a8c79b1e10712fe3f1b.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
4b8c4cfc220a9a8c79b1e10712fe3f1b.exe
-
Size
93KB
-
MD5
4b8c4cfc220a9a8c79b1e10712fe3f1b
-
SHA1
9a5c1db0c51cfd2a78b67f0fc69e76ebb846a6ed
-
SHA256
2566b3c8958350c97d8332c921a5039d55b821a15440ac0e0087570d287338ba
-
SHA512
1116c3b4a3f090afbd4e89571fefb8560b08df8fb9dce2bf940e27d298b95cb6f91ba1c45735abe238c2d0133053e37a873ad6d6b93ba71380f7cb4e74b0a522
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 4 IoCs
Processes:
4b8c4cfc220a9a8c79b1e10712fe3f1b.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e7f38a6aedc714cc5ab87150973b7deWindows Update.exe 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e7f38a6aedc714cc5ab87150973b7deWindows Update.exe 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory 2 IoCs
Processes:
4b8c4cfc220a9a8c79b1e10712fe3f1b.exedescription ioc process File created C:\Windows\SysWOW64\Explower.exe 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe File opened for modification C:\Windows\SysWOW64\Explower.exe 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4b8c4cfc220a9a8c79b1e10712fe3f1b.exepid process 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
4b8c4cfc220a9a8c79b1e10712fe3f1b.exepid process 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
4b8c4cfc220a9a8c79b1e10712fe3f1b.exedescription pid process Token: SeDebugPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: 33 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe Token: SeIncBasePriorityPrivilege 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4b8c4cfc220a9a8c79b1e10712fe3f1b.exedescription pid process target process PID 1732 wrote to memory of 588 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 588 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 588 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 588 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1404 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1404 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1404 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1404 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1072 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1072 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1072 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe PID 1732 wrote to memory of 1072 1732 4b8c4cfc220a9a8c79b1e10712fe3f1b.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8c4cfc220a9a8c79b1e10712fe3f1b.exe"C:\Users\Admin\AppData\Local\Temp\4b8c4cfc220a9a8c79b1e10712fe3f1b.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\4b8c4cfc220a9a8c79b1e10712fe3f1b.exe" "4b8c4cfc220a9a8c79b1e10712fe3f1b.exe" ENABLE2⤵PID:588
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\4b8c4cfc220a9a8c79b1e10712fe3f1b.exe"2⤵PID:1404
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\4b8c4cfc220a9a8c79b1e10712fe3f1b.exe" "4b8c4cfc220a9a8c79b1e10712fe3f1b.exe" ENABLE2⤵PID:1072