Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
06-01-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
b89b5e517e7df0a38513dd9678dcf8b6.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b89b5e517e7df0a38513dd9678dcf8b6.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
b89b5e517e7df0a38513dd9678dcf8b6.exe
-
Size
31KB
-
MD5
b89b5e517e7df0a38513dd9678dcf8b6
-
SHA1
9a8a96035480e095f119357052b9a74714799ee7
-
SHA256
061d0bf70bd333159f63aa7bf4f05d51c6056e634df5fc2368f376b54585b530
-
SHA512
8163409b04fa98e4aa642deee92bbe589a2835e96ebce6c29faacda9deba815786143e224782ed9c8d90b20784fdf9535242c6e840c8e85bdb841b55679cb5b5
Score
10/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b89b5e517e7df0a38513dd9678dcf8b6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\bc0a855433cc362854ed34ff96dd565f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\b89b5e517e7df0a38513dd9678dcf8b6.exe\" .." b89b5e517e7df0a38513dd9678dcf8b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bc0a855433cc362854ed34ff96dd565f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\b89b5e517e7df0a38513dd9678dcf8b6.exe\" .." b89b5e517e7df0a38513dd9678dcf8b6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dw20.exepid process 3980 dw20.exe 3980 dw20.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
dw20.exeb89b5e517e7df0a38513dd9678dcf8b6.exedescription pid process Token: SeRestorePrivilege 3980 dw20.exe Token: SeBackupPrivilege 3980 dw20.exe Token: SeDebugPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: 33 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe Token: SeIncBasePriorityPrivilege 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b89b5e517e7df0a38513dd9678dcf8b6.exedescription pid process target process PID 2472 wrote to memory of 968 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe netsh.exe PID 2472 wrote to memory of 968 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe netsh.exe PID 2472 wrote to memory of 968 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe netsh.exe PID 2472 wrote to memory of 3980 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe dw20.exe PID 2472 wrote to memory of 3980 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe dw20.exe PID 2472 wrote to memory of 3980 2472 b89b5e517e7df0a38513dd9678dcf8b6.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b89b5e517e7df0a38513dd9678dcf8b6.exe"C:\Users\Admin\AppData\Local\Temp\b89b5e517e7df0a38513dd9678dcf8b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\b89b5e517e7df0a38513dd9678dcf8b6.exe" "b89b5e517e7df0a38513dd9678dcf8b6.exe" ENABLE2⤵PID:968
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 14642⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980