Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 03:33
Static task
static1
Behavioral task
behavioral1
Sample
aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe
-
Size
160KB
-
MD5
780d1cd0f9a43ccbae19271e83ccfc54
-
SHA1
68ebef0b3a89c3ebbb3fddc33a610ab6ad4b14d9
-
SHA256
aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf
-
SHA512
6234d509b259000a465a2ba75664bdedcd9906e9aaee87d72447ada39a3004ee882aa2e3efeecdec112bc5b880027f053a3f691e48f7e5d832adeb84e4dd0ed2
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exedescription pid process Token: SeDebugPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: 33 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe Token: SeIncBasePriorityPrivilege 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exedescription pid process target process PID 1404 wrote to memory of 1072 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe netsh.exe PID 1404 wrote to memory of 1072 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe netsh.exe PID 1404 wrote to memory of 1072 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe netsh.exe PID 1404 wrote to memory of 1072 1404 aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe"C:\Users\Admin\AppData\Local\Temp\aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe" "aa4a6b78c9d23c605652f32644832f9a763d734f934aafc94993c6c6fb05bfaf.exe" ENABLE2⤵PID:1072
-