Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 04:00
Behavioral task
behavioral1
Sample
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe
-
Size
31KB
-
MD5
080bc8a89953c8ebfc9da1f88a23aac8
-
SHA1
5a30d142fcf92d8c688db48ca4af83e22000da47
-
SHA256
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee
-
SHA512
9cf6631b7fbf96dc51ba9360e18fb0094eb77b14faed5dbebbae0ab1bcf859b9857e791b2fe596d154276be02c8c10913e6cd28ea51f3fc1b7a4c12d5fbd3f9a
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exedescription pid process Token: SeDebugPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: 33 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe Token: SeIncBasePriorityPrivilege 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exedescription pid process target process PID 4752 wrote to memory of 2328 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe netsh.exe PID 4752 wrote to memory of 2328 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe netsh.exe PID 4752 wrote to memory of 2328 4752 d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe"C:\Users\Admin\AppData\Local\Temp\d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe" "d4a1415217de267fd69abf81125c6448b57d802b248732c019e20abf991783ee.exe" ENABLE2⤵
- Modifies Windows Firewall