Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-07-2022 09:02
Static task
static1
Behavioral task
behavioral1
Sample
0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exe
-
Size
70KB
-
MD5
ca96229390a0e6a53e8f2125f2c01114
-
SHA1
a54b1081cf58724f8cb292b4d165dfee2fb1c9f6
-
SHA256
0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c
-
SHA512
e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule behavioral2/memory/3116-131-0x0000000000DD0000-0x0000000000DFD000-memory.dmp upx behavioral2/memory/3116-132-0x0000000000DD0000-0x0000000000DFD000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exedescription pid process target process PID 3116 wrote to memory of 3816 3116 0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exe netsh.exe PID 3116 wrote to memory of 3816 3116 0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exe netsh.exe PID 3116 wrote to memory of 3816 3116 0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exe"C:\Users\Admin\AppData\Local\Temp\0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=33892⤵
- Modifies Windows Firewall