Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:47
Static task
static1
Behavioral task
behavioral1
Sample
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe
Resource
win10v2004-20221111-en
General
-
Target
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe
-
Size
205KB
-
MD5
125f7bee35fccb7b3572ccb79b633261
-
SHA1
d8893c63af3f667992da805bd3d64b2b85f3ecfe
-
SHA256
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5
-
SHA512
361274ac350d812f7cbade5780bc3865b4f5532104a99fe79203e59e2f4fb1897aa8830fb1d151241df5278e5462a5a5785e6c5dbe71cb15dec522dc4eda53da
-
SSDEEP
384:RvkZWxs1sTZ4BsLEm+3CtbTXAY5RUwVEYS+jKy8YzHoLyq47TO4/FakhH8ouK8no:RsIG8Ek
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\959db10d818a75df24f0fbba9dd547e0.exe 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\959db10d818a75df24f0fbba9dd547e0.exe 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\959db10d818a75df24f0fbba9dd547e0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe\" .." 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\959db10d818a75df24f0fbba9dd547e0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe\" .." 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exedescription pid process Token: SeDebugPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: 33 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe Token: SeIncBasePriorityPrivilege 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exedescription pid process target process PID 1348 wrote to memory of 1936 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe netsh.exe PID 1348 wrote to memory of 1936 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe netsh.exe PID 1348 wrote to memory of 1936 1348 0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe"C:\Users\Admin\AppData\Local\Temp\0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe" "0485826432dc5de671a247581419cdbdd9d9d0e7166c8c0d1829dec3dd095cd5.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:1936
-