Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 14:11
Behavioral task
behavioral1
Sample
aecee89ac383e028e843f29aebbb191d.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
aecee89ac383e028e843f29aebbb191d.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
aecee89ac383e028e843f29aebbb191d.exe
-
Size
37KB
-
MD5
aecee89ac383e028e843f29aebbb191d
-
SHA1
fb228c1a12415c6f301a76774c28ac602dafde44
-
SHA256
fc4fc64aa60cab72de617368e5dfdd772f99f7b2881947193e36f0adc169776a
-
SHA512
2f4b80fdf6aefa1b6ee10edcebc48dce8ec26c85eaf226a67c7d32295a8964a648b855e9d5a03d7a42681cb65175499abb911e8ba001651d56f0e5b420c6aed2
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
aecee89ac383e028e843f29aebbb191d.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d80f0fab8a423604e7b276e9befe9efa.exe aecee89ac383e028e843f29aebbb191d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d80f0fab8a423604e7b276e9befe9efa.exe aecee89ac383e028e843f29aebbb191d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
aecee89ac383e028e843f29aebbb191d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\d80f0fab8a423604e7b276e9befe9efa = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aecee89ac383e028e843f29aebbb191d.exe\" .." aecee89ac383e028e843f29aebbb191d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\d80f0fab8a423604e7b276e9befe9efa = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aecee89ac383e028e843f29aebbb191d.exe\" .." aecee89ac383e028e843f29aebbb191d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
aecee89ac383e028e843f29aebbb191d.exepid process 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe 3828 aecee89ac383e028e843f29aebbb191d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
aecee89ac383e028e843f29aebbb191d.exepid process 3828 aecee89ac383e028e843f29aebbb191d.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
aecee89ac383e028e843f29aebbb191d.exedescription pid process Token: SeDebugPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe Token: 33 3828 aecee89ac383e028e843f29aebbb191d.exe Token: SeIncBasePriorityPrivilege 3828 aecee89ac383e028e843f29aebbb191d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
aecee89ac383e028e843f29aebbb191d.exedescription pid process target process PID 3828 wrote to memory of 4316 3828 aecee89ac383e028e843f29aebbb191d.exe netsh.exe PID 3828 wrote to memory of 4316 3828 aecee89ac383e028e843f29aebbb191d.exe netsh.exe PID 3828 wrote to memory of 4316 3828 aecee89ac383e028e843f29aebbb191d.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aecee89ac383e028e843f29aebbb191d.exe"C:\Users\Admin\AppData\Local\Temp\aecee89ac383e028e843f29aebbb191d.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\aecee89ac383e028e843f29aebbb191d.exe" "aecee89ac383e028e843f29aebbb191d.exe" ENABLE2⤵PID:4316