Analysis

  • max time kernel
    148s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 22:31

General

  • Target

    899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b.exe

  • Size

    408KB

  • MD5

    eb01f00b776d7e24666c51a16d8b0886

  • SHA1

    2ff5a10403fd8073b1a1b4eaa776988256f1d988

  • SHA256

    899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b

  • SHA512

    1a8bcca0fe9c794088a18aabe94601847d7523a7b79ae9b49d24cd09615256fc31f74b354b3c620a0ae94c634568d95c825e41b3aa35b11717f0651439550580

  • SSDEEP

    6144:wA9x5O5TLn9BHng5HaH/bNlNvdR1NvVejs9wmQ8XUvuS:zx5O5TTfgajhNxVejs9wmQ8XKL

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b.exe
    "C:\Users\Admin\AppData\Local\Temp\899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1976
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\899d62d1e055adc51ef1204c991e18d872ef921a927aa951a184c3019924d87b.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1084
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:892
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\QE566QJYUM.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\QE566QJYUM.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\QE566QJYUM.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\QE566QJYUM.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/900-57-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB