Analysis
-
max time kernel
182s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 09:00
Behavioral task
behavioral1
Sample
9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe
Resource
win7-20221111-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe
-
Size
268KB
-
MD5
f76e47b354da08496bc2bc5bf0bfda02
-
SHA1
1409e71f2c63ce84ba8dfac8625b137c06d3cff5
-
SHA256
9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d
-
SHA512
ffeab72defd4f0efe93d41962245734fbceff9b4abf8b0bfe1673c7848d9e5d7c38bd8d0a3cb37db6b785af66963f9d5a1438a77268145ab2605524b34fc5806
-
SSDEEP
6144:E1DbFfBHMB/bMz+AvVV17Zlym74y64CNnyVBv9suFs:6DbFfBHky+QHhzEJ4CIBv9suF
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 956 netsh.exe -
resource yara_rule behavioral2/memory/4548-133-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4548-135-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wintime = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe" 9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4548 wrote to memory of 1848 4548 9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe 81 PID 4548 wrote to memory of 1848 4548 9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe 81 PID 4548 wrote to memory of 1848 4548 9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe 81 PID 1848 wrote to memory of 956 1848 cmd.exe 83 PID 1848 wrote to memory of 956 1848 cmd.exe 83 PID 1848 wrote to memory of 956 1848 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe"C:\Users\Admin\AppData\Local\Temp\9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\cmd.execmd /C C:\Windows\system32\netsh.exe firewall add allowedprogram C:\Users\Admin\AppData\Local\Temp\9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe "cmdLD" ENABLE2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall add allowedprogram C:\Users\Admin\AppData\Local\Temp\9a04462ead4b7251e2e3cd681f95e3f5b06ea05a51813fb9cb4ac8186fb3ab2d.exe "cmdLD" ENABLE3⤵
- Modifies Windows Firewall
PID:956
-
-