Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 17:55

General

  • Target

    6315eb063c4308544234aa673dd4c7fe000132468d5095d4c827768aff3a3040.exe

  • Size

    37KB

  • MD5

    c7a8f1df58106bf2feca10982b036563

  • SHA1

    69accc51b9ec52522b0679689d19cc978c1ed176

  • SHA256

    6315eb063c4308544234aa673dd4c7fe000132468d5095d4c827768aff3a3040

  • SHA512

    121bf135b3ba74e5617a6dad0224eef150595e4c16610cf16865c89461d1a504a069b02339499134d836ed721b26b502c7273dd4b28fd2ca00990e7afa118db2

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6315eb063c4308544234aa673dd4c7fe000132468d5095d4c827768aff3a3040.exe
    "C:\Users\Admin\AppData\Local\Temp\6315eb063c4308544234aa673dd4c7fe000132468d5095d4c827768aff3a3040.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\6315eb063c4308544234aa673dd4c7fe000132468d5095d4c827768aff3a3040.exe" "6315eb063c4308544234aa673dd4c7fe000132468d5095d4c827768aff3a3040.exe" ENABLE
      2⤵
        PID:2504

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2204-130-0x00000000746A0000-0x0000000074C51000-memory.dmp
      Filesize

      5.7MB

    • memory/2504-131-0x0000000000000000-mapping.dmp