Analysis
-
max time kernel
4294210s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
11-03-2022 10:38
Behavioral task
behavioral1
Sample
aee47c9f2a800ba2748a52c7fbe988a5.exe
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
aee47c9f2a800ba2748a52c7fbe988a5.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
aee47c9f2a800ba2748a52c7fbe988a5.exe
-
Size
37KB
-
MD5
aee47c9f2a800ba2748a52c7fbe988a5
-
SHA1
ade132a9ed46804cc1878676706985429b2dbab3
-
SHA256
52ec1d54b1442de234083a4c03d26e2a5465179bfb368e5662b47f417efce904
-
SHA512
429a738b3d209987f5c9390e7a25927c1d629844046055fe250609dd59272bc29442101351e4f47ef89182f44ef6fcf2dc38b4e294828f17f6adafe6cdf200c3
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
aee47c9f2a800ba2748a52c7fbe988a5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f56e20201a979bd30fb007f4dc803ee8.exe aee47c9f2a800ba2748a52c7fbe988a5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f56e20201a979bd30fb007f4dc803ee8.exe aee47c9f2a800ba2748a52c7fbe988a5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
aee47c9f2a800ba2748a52c7fbe988a5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Run\f56e20201a979bd30fb007f4dc803ee8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aee47c9f2a800ba2748a52c7fbe988a5.exe\" .." aee47c9f2a800ba2748a52c7fbe988a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f56e20201a979bd30fb007f4dc803ee8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aee47c9f2a800ba2748a52c7fbe988a5.exe\" .." aee47c9f2a800ba2748a52c7fbe988a5.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
aee47c9f2a800ba2748a52c7fbe988a5.exedescription pid process Token: SeDebugPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: 33 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe Token: SeIncBasePriorityPrivilege 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
aee47c9f2a800ba2748a52c7fbe988a5.exedescription pid process target process PID 1500 wrote to memory of 752 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe netsh.exe PID 1500 wrote to memory of 752 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe netsh.exe PID 1500 wrote to memory of 752 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe netsh.exe PID 1500 wrote to memory of 752 1500 aee47c9f2a800ba2748a52c7fbe988a5.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aee47c9f2a800ba2748a52c7fbe988a5.exe"C:\Users\Admin\AppData\Local\Temp\aee47c9f2a800ba2748a52c7fbe988a5.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\aee47c9f2a800ba2748a52c7fbe988a5.exe" "aee47c9f2a800ba2748a52c7fbe988a5.exe" ENABLE2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1500-54-0x0000000075A31000-0x0000000075A33000-memory.dmpFilesize
8KB
-
memory/1500-56-0x0000000000AD0000-0x0000000000AD1000-memory.dmpFilesize
4KB
-
memory/1500-55-0x0000000074C70000-0x000000007521B000-memory.dmpFilesize
5.7MB
-
memory/1500-57-0x0000000074C70000-0x000000007521B000-memory.dmpFilesize
5.7MB