Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:08
Behavioral task
behavioral1
Sample
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe
Resource
win10v2004-20220812-en
General
-
Target
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe
-
Size
29KB
-
MD5
75d24288b591c903d6f5d9682aafda9c
-
SHA1
b6b0a1994b9c30e12f28a420de53f1565d6a0c40
-
SHA256
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003
-
SHA512
fc07b9654f77e66860d02af6fafea165af8662b7138103c2445ed68b321b96c3dad157661fed30ed64499e7a7e10ad98fada00b46a9d48f316ef7b973da89920
-
SSDEEP
384:NhpQjtl7jBnoKoK3JX15nHK4GumRDWEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzg:N27hoKoGJFNK4ARvRehBKh0p29SgRd6
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe\" .." 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe\" .." 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exepid process 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exedescription pid process Token: SeDebugPrivilege 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exedescription pid process target process PID 1480 wrote to memory of 1716 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe netsh.exe PID 1480 wrote to memory of 1716 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe netsh.exe PID 1480 wrote to memory of 1716 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe netsh.exe PID 1480 wrote to memory of 1716 1480 4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe"C:\Users\Admin\AppData\Local\Temp\4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe" "4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:1716