Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 21:41
Behavioral task
behavioral1
Sample
b701e3585e852755624bc4965e7af509.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b701e3585e852755624bc4965e7af509.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
b701e3585e852755624bc4965e7af509.exe
-
Size
37KB
-
MD5
b701e3585e852755624bc4965e7af509
-
SHA1
38f7bee5480c1f5d0b08d7d072c0980971a9eda9
-
SHA256
e79459dc4c5898824dc2d32d24bcd0156e699fbdafb68ba6e5daa43cce5cbdda
-
SHA512
99c57bb8d95a1a5654ab962de3de516552ef6652cad0169ba54a79b9371986fea60171e5e8ef0ccd2f871c766f36c3cb9a19ddd6de464d871ec3262cb584ae95
-
SSDEEP
384:IKwCT0i9rdTe/kCOyU7jcnZ8DfmTgrAF+rMRTyN/0L+EcoinblneHQM3epzXKNrW:h1J1CFU7jcC7m8rM+rMRa8NuYot
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4712 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe Token: 33 1740 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 1740 b701e3585e852755624bc4965e7af509.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 4712 1740 b701e3585e852755624bc4965e7af509.exe 91 PID 1740 wrote to memory of 4712 1740 b701e3585e852755624bc4965e7af509.exe 91 PID 1740 wrote to memory of 4712 1740 b701e3585e852755624bc4965e7af509.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b701e3585e852755624bc4965e7af509.exe"C:\Users\Admin\AppData\Local\Temp\b701e3585e852755624bc4965e7af509.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\b701e3585e852755624bc4965e7af509.exe" "b701e3585e852755624bc4965e7af509.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:4712
-