Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 12:41
Behavioral task
behavioral1
Sample
2d9cf7d987f8a980d0bc4c9744ee4ded.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d9cf7d987f8a980d0bc4c9744ee4ded.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
2d9cf7d987f8a980d0bc4c9744ee4ded.exe
-
Size
23KB
-
MD5
2d9cf7d987f8a980d0bc4c9744ee4ded
-
SHA1
60969d91d1045b9b725ec8ee6df47ac74f1fb68d
-
SHA256
1c2de35b1875197d605b226ac3a898ce2330a1b1c2b557f1931a0848f1655b27
-
SHA512
8cf8931a83836589694db5d832b55252a195abf8afe42fad849cb4a3bdc8c84e7c5b293a9ea598d09ab9831ba8c8dfe179b0fb5663ddc5a508018a5b60c06ede
-
SSDEEP
384:isqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZCt:9f65K2Yf1jKRpcnu1
Score
10/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2276 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7b5756e1b92b22cf190156c75dfb1e31 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2d9cf7d987f8a980d0bc4c9744ee4ded.exe\" .." 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7b5756e1b92b22cf190156c75dfb1e31 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2d9cf7d987f8a980d0bc4c9744ee4ded.exe\" .." 2d9cf7d987f8a980d0bc4c9744ee4ded.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: 33 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe Token: SeIncBasePriorityPrivilege 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2276 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe 83 PID 1484 wrote to memory of 2276 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe 83 PID 1484 wrote to memory of 2276 1484 2d9cf7d987f8a980d0bc4c9744ee4ded.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d9cf7d987f8a980d0bc4c9744ee4ded.exe"C:\Users\Admin\AppData\Local\Temp\2d9cf7d987f8a980d0bc4c9744ee4ded.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\2d9cf7d987f8a980d0bc4c9744ee4ded.exe" "2d9cf7d987f8a980d0bc4c9744ee4ded.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2276
-