Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 08:00
Behavioral task
behavioral1
Sample
9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe
-
Size
12KB
-
MD5
30ccfc08a8b49d7db3ea372c1b9f0a11
-
SHA1
7b1bdcf4b918ab14e0d78390ea25bfec2d4ffb7b
-
SHA256
9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1
-
SHA512
18aab26ef4a2a1f7b00b27ab206fa739f89b1112c973b0151efdaddcf0ccf2038789d03181dec15e1901a113131d56231323b51dac4736443a058fbceb1da4cd
-
SSDEEP
192:LtvzctIHPWBCcms2kmYgBIlUktu521ptZxkMpPAp2aW5MOeGJ8wIhd:ZQtIHOuxk46/tuMXTh3BeGJ8ws
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2840-132-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2840-135-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2840 9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3120 2840 9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe 79 PID 2840 wrote to memory of 3120 2840 9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe 79 PID 2840 wrote to memory of 3120 2840 9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe 79 PID 3120 wrote to memory of 4968 3120 net.exe 81 PID 3120 wrote to memory of 4968 3120 net.exe 81 PID 3120 wrote to memory of 4968 3120 net.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe"C:\Users\Admin\AppData\Local\Temp\9a9c9e1e1caf02a5356a6aff8743fc776e44682900aab9ae6b9c378d075bb9b1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net.exenet stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵PID:4968
-
-