Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 21:42
Behavioral task
behavioral1
Sample
b701e3585e852755624bc4965e7af509.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b701e3585e852755624bc4965e7af509.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
b701e3585e852755624bc4965e7af509.exe
-
Size
37KB
-
MD5
b701e3585e852755624bc4965e7af509
-
SHA1
38f7bee5480c1f5d0b08d7d072c0980971a9eda9
-
SHA256
e79459dc4c5898824dc2d32d24bcd0156e699fbdafb68ba6e5daa43cce5cbdda
-
SHA512
99c57bb8d95a1a5654ab962de3de516552ef6652cad0169ba54a79b9371986fea60171e5e8ef0ccd2f871c766f36c3cb9a19ddd6de464d871ec3262cb584ae95
-
SSDEEP
384:IKwCT0i9rdTe/kCOyU7jcnZ8DfmTgrAF+rMRTyN/0L+EcoinblneHQM3epzXKNrW:h1J1CFU7jcC7m8rM+rMRa8NuYot
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2040 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe Token: 33 924 b701e3585e852755624bc4965e7af509.exe Token: SeIncBasePriorityPrivilege 924 b701e3585e852755624bc4965e7af509.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 924 wrote to memory of 2040 924 b701e3585e852755624bc4965e7af509.exe 28 PID 924 wrote to memory of 2040 924 b701e3585e852755624bc4965e7af509.exe 28 PID 924 wrote to memory of 2040 924 b701e3585e852755624bc4965e7af509.exe 28 PID 924 wrote to memory of 2040 924 b701e3585e852755624bc4965e7af509.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b701e3585e852755624bc4965e7af509.exe"C:\Users\Admin\AppData\Local\Temp\b701e3585e852755624bc4965e7af509.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\b701e3585e852755624bc4965e7af509.exe" "b701e3585e852755624bc4965e7af509.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2040
-