Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2023, 20:08
Behavioral task
behavioral1
Sample
bMY4.exe
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
bMY4.exe
-
Size
23KB
-
MD5
6871449a52e2076a89a6c9279fb35475
-
SHA1
de600d1a6a97cd29bd977cd0db2bddfc2a403e63
-
SHA256
3cb22c29fad4b8369e7c77f5b7d7bf81941cbe57bc5df6fcadff39810234ee31
-
SHA512
f54d35b0c8d2978e074e9cd8bea8a63c866af5db49badf17f4b64ec60ddb044b5c571e1731de9673875510d859dce3443eec8cb7d10216073952c2a7852b9fea
-
SSDEEP
384:ocqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZVVJP:X30py6vhxaRpcnu2
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2204 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe Token: 33 1000 bMY4.exe Token: SeIncBasePriorityPrivilege 1000 bMY4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1000 wrote to memory of 2204 1000 bMY4.exe 85 PID 1000 wrote to memory of 2204 1000 bMY4.exe 85 PID 1000 wrote to memory of 2204 1000 bMY4.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bMY4.exe"C:\Users\Admin\AppData\Local\Temp\bMY4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\bMY4.exe" "bMY4.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2204
-