Analysis
-
max time kernel
149s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 04:26
Behavioral task
behavioral1
Sample
77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe
-
Size
37KB
-
MD5
95e38a6641c8eef0834c36be400596b1
-
SHA1
47390ee7711ca63ea43972d27fbce813ce032a30
-
SHA256
77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988
-
SHA512
4c3fef80a81f195a63b0595e4b45005ea5c12a7d6137fade2f6a1ee66f599a22a5d185258fd07c5c8aa919da01172b023f082234f5bd0b96ccf77d31b47cfc86
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exedescription pid process Token: SeDebugPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: 33 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe Token: SeIncBasePriorityPrivilege 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exedescription pid process target process PID 2044 wrote to memory of 1968 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe netsh.exe PID 2044 wrote to memory of 1968 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe netsh.exe PID 2044 wrote to memory of 1968 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe netsh.exe PID 2044 wrote to memory of 1968 2044 77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe"C:\Users\Admin\AppData\Local\Temp\77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe" "77d240e5732ec6217c1560ab43098785d109d9b87a9dc6a94f1272cf64b64988.exe" ENABLE2⤵