Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 10:21
Behavioral task
behavioral1
Sample
b257e67bf0f07d9da9bbeae234cc83bf.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b257e67bf0f07d9da9bbeae234cc83bf.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
b257e67bf0f07d9da9bbeae234cc83bf.exe
-
Size
37KB
-
MD5
b257e67bf0f07d9da9bbeae234cc83bf
-
SHA1
58ade1ccb84ff6d14d3a97f417af4ae44685ff3a
-
SHA256
6722674f72bb654e619e9314a0c32936438932064ed3ff7872100a17317095ce
-
SHA512
cfd47f7eaf262bdeb99d21ff503b962db6cb3af9ce02f3b19b8af515bda7729a4bef176b443e9b70b3cc20ac0f1240c32a435863f51e2302902bea5f8b0599ec
-
SSDEEP
384:FmOs0IiejvCVLO309QmykrtG+dA+VCwvOSifrAF+rMRTyN/0L+EcoinblneHQM3R:nFdGdkrgYUwWS0rM+rMRa8NuK9t
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4696 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: 33 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe Token: SeIncBasePriorityPrivilege 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4696 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe 87 PID 5052 wrote to memory of 4696 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe 87 PID 5052 wrote to memory of 4696 5052 b257e67bf0f07d9da9bbeae234cc83bf.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b257e67bf0f07d9da9bbeae234cc83bf.exe"C:\Users\Admin\AppData\Local\Temp\b257e67bf0f07d9da9bbeae234cc83bf.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\b257e67bf0f07d9da9bbeae234cc83bf.exe" "b257e67bf0f07d9da9bbeae234cc83bf.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:4696
-