Analysis
-
max time kernel
154s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
20-12-2021 08:48
Static task
static1
Behavioral task
behavioral1
Sample
97b280b69f91f49d28711137942b3d9b.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
97b280b69f91f49d28711137942b3d9b.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
97b280b69f91f49d28711137942b3d9b.exe
-
Size
157KB
-
MD5
97b280b69f91f49d28711137942b3d9b
-
SHA1
69f8fd656c22b84eeaac5960e9ef273800c67f0e
-
SHA256
305be5c89a59aea6f58ccb50ce51fb7a2e74ece50c49a268afec5eef4de73e0e
-
SHA512
cf04d137d9b6a64b370f32de9c47706682e8eba06fb3c2c665ef6a32ebfd2ba5f4f014dd7dcafb04ac4cbc2c9bf97fb8316f5430e5250a3b8063c74842d92a65
Score
10/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
97b280b69f91f49d28711137942b3d9b.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c285739983b5c556c83239c40bc798a3.exe 97b280b69f91f49d28711137942b3d9b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c285739983b5c556c83239c40bc798a3.exe 97b280b69f91f49d28711137942b3d9b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
97b280b69f91f49d28711137942b3d9b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\c285739983b5c556c83239c40bc798a3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\97b280b69f91f49d28711137942b3d9b.exe\" .." 97b280b69f91f49d28711137942b3d9b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\c285739983b5c556c83239c40bc798a3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\97b280b69f91f49d28711137942b3d9b.exe\" .." 97b280b69f91f49d28711137942b3d9b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
97b280b69f91f49d28711137942b3d9b.exepid process 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe 732 97b280b69f91f49d28711137942b3d9b.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
97b280b69f91f49d28711137942b3d9b.exedescription pid process Token: SeDebugPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe Token: 33 732 97b280b69f91f49d28711137942b3d9b.exe Token: SeIncBasePriorityPrivilege 732 97b280b69f91f49d28711137942b3d9b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
97b280b69f91f49d28711137942b3d9b.exedescription pid process target process PID 732 wrote to memory of 1188 732 97b280b69f91f49d28711137942b3d9b.exe netsh.exe PID 732 wrote to memory of 1188 732 97b280b69f91f49d28711137942b3d9b.exe netsh.exe PID 732 wrote to memory of 1188 732 97b280b69f91f49d28711137942b3d9b.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97b280b69f91f49d28711137942b3d9b.exe"C:\Users\Admin\AppData\Local\Temp\97b280b69f91f49d28711137942b3d9b.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\97b280b69f91f49d28711137942b3d9b.exe" "97b280b69f91f49d28711137942b3d9b.exe" ENABLE2⤵PID:1188