Analysis

  • max time kernel
    188s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 07:14

General

  • Target

    49c0e3bbb59d81bad201d19c17c77a77f12253be70782b409d57cd2c4df7d190.exe

  • Size

    37KB

  • MD5

    555c42a4d6cee75f5b74bb20ff6dc65c

  • SHA1

    9b5856345e889808b23bb4e1408684d7082c7b08

  • SHA256

    49c0e3bbb59d81bad201d19c17c77a77f12253be70782b409d57cd2c4df7d190

  • SHA512

    995de3f70a892312b0c50d219e9c40e508811be5e486d8c71e075197d2e070bf31acc66baa07d392db0fed9c8bf185e88b9dc8a277deadbadbc7df12ff9f044d

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49c0e3bbb59d81bad201d19c17c77a77f12253be70782b409d57cd2c4df7d190.exe
    "C:\Users\Admin\AppData\Local\Temp\49c0e3bbb59d81bad201d19c17c77a77f12253be70782b409d57cd2c4df7d190.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\49c0e3bbb59d81bad201d19c17c77a77f12253be70782b409d57cd2c4df7d190.exe" "49c0e3bbb59d81bad201d19c17c77a77f12253be70782b409d57cd2c4df7d190.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2016

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/972-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp
    Filesize

    8KB

  • memory/972-55-0x0000000074330000-0x00000000748DB000-memory.dmp
    Filesize

    5.7MB

  • memory/972-58-0x0000000074330000-0x00000000748DB000-memory.dmp
    Filesize

    5.7MB

  • memory/2016-56-0x0000000000000000-mapping.dmp