Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 02:04

General

  • Target

    4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21.exe

  • Size

    419KB

  • MD5

    5ec341e12424f0b9326cd073dfa8125b

  • SHA1

    50cf6613f73ea3d3b93f8460b7b3ee74506db55a

  • SHA256

    4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21

  • SHA512

    cf562844ca2290232a4bb23c1a0b25765ac090be97b89d989feb5fb80dbfedfa75c439e99a106e0a936c6e8b351866c5bb3844cb3a1b0523668f338ff9a2776b

  • SSDEEP

    6144:HwFr4PxWh0s2cBHng5HamJY4jESRL2RY7he2v8cV4u70vj1UPQ1ca/:Hw65Wh8AgamtFAYNv8cV4u70vRUPsl

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21.exe
    "C:\Users\Admin\AppData\Local\Temp\4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1712
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\4c83a6eb8c14805f54b56acbf3f310f2d878bdcb0a44ab3889ff7b2d7f083f21.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1864
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2012-57-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB