Analysis
-
max time kernel
169s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 10:27
Static task
static1
Behavioral task
behavioral1
Sample
a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe
Resource
win10v2004-20220812-en
General
-
Target
a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe
-
Size
171KB
-
MD5
01ec03319966ca96eee4ce20485a48b2
-
SHA1
80a1ab4922d3b8cc2e1e6df3750492c435a2528e
-
SHA256
a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309
-
SHA512
5221cc593a8105794e0e4359dd4af10383497dee61a29227747ecc34dbf6db05eaf0382af487e429d20df9b5ff00ab09962502c9551aa45d5c24c5ad04ec4c32
-
SSDEEP
3072:Dhuomne0JSGnjpeb2sjyG9Umhh/RviwJKQx/PaPB2RBZ65AThUAIoFX1Zqbq:k7I1QmXRviwJKOHOB2/Z1hv
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid Process 1588 netsh.exe 4876 netsh.exe 1324 netsh.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exedescription pid Process procid_target PID 3052 set thread context of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exea99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exedescription pid Process Token: SeDebugPrivilege 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe Token: SeDebugPrivilege 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe Token: SeDebugPrivilege 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exea99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exedescription pid Process procid_target PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 3052 wrote to memory of 5076 3052 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 82 PID 5076 wrote to memory of 1588 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 83 PID 5076 wrote to memory of 1588 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 83 PID 5076 wrote to memory of 1588 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 83 PID 5076 wrote to memory of 4876 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 84 PID 5076 wrote to memory of 4876 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 84 PID 5076 wrote to memory of 4876 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 84 PID 5076 wrote to memory of 1324 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 88 PID 5076 wrote to memory of 1324 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 88 PID 5076 wrote to memory of 1324 5076 a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe"C:\Users\Admin\AppData\Local\Temp\a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exeC:\Users\Admin\AppData\Local\Temp\a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule profile=any name=Win2y23⤵
- Modifies Windows Firewall
PID:1588
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=out name=Win2y2 program="C:\Users\Admin\AppData\Local\Temp\a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe"3⤵
- Modifies Windows Firewall
PID:4876
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name=Win2y2 program="C:\Users\Admin\AppData\Local\Temp\a99b2fbca2e80ea7ca4662f8858254caf3e554a85bf52e7740b1019b7deeb309.exe"3⤵
- Modifies Windows Firewall
PID:1324
-
-