Analysis
-
max time kernel
146s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 04:00
Behavioral task
behavioral1
Sample
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe
-
Size
31KB
-
MD5
080bc8a89953c8ebfc9da1f88a23aac8
-
SHA1
5a30d142fcf92d8c688db48ca4af83e22000da47
-
SHA256
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee
-
SHA512
9cf6631b7fbf96dc51ba9360e18fb0094eb77b14faed5dbebbae0ab1bcf859b9857e791b2fe596d154276be02c8c10913e6cd28ea51f3fc1b7a4c12d5fbd3f9a
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exedescription pid process Token: SeDebugPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exedescription pid process target process PID 876 wrote to memory of 964 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe netsh.exe PID 876 wrote to memory of 964 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe netsh.exe PID 876 wrote to memory of 964 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe netsh.exe PID 876 wrote to memory of 964 876 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe"C:\Users\Admin\AppData\Local\Temp\d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe" "d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe" ENABLE2⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/876-54-0x0000000075E31000-0x0000000075E33000-memory.dmpFilesize
8KB
-
memory/876-55-0x0000000074EA0000-0x000000007544B000-memory.dmpFilesize
5.7MB
-
memory/876-56-0x0000000074EA0000-0x000000007544B000-memory.dmpFilesize
5.7MB
-
memory/964-57-0x0000000000000000-mapping.dmp