Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2023 22:06

General

  • Target

    b7a78039c28b0651b98e724e467b7ae2.exe

  • Size

    93KB

  • MD5

    b7a78039c28b0651b98e724e467b7ae2

  • SHA1

    ec86bf60519e232be075af5f3adc11464e5ac35d

  • SHA256

    76a792f785b44066a7b802ef54cb979562357151be7e4eb5624dc929799603ba

  • SHA512

    bfee74ee135312163e06ee13bece5459b25065b28796e1bef1f03101a46ec0f5090a5318aa21dd51e2c167f39ed1993c54799eb15a36c33365ef40fd7eaadd73

  • SSDEEP

    1536:nUNJD/HBZbszKu9AZp77r1jEwzGi1dDswDxgS:nUUzK4AZtHCi1dDu

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a78039c28b0651b98e724e467b7ae2.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a78039c28b0651b98e724e467b7ae2.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\b7a78039c28b0651b98e724e467b7ae2.exe" "b7a78039c28b0651b98e724e467b7ae2.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2688

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2772-133-0x00000000012E0000-0x00000000012F0000-memory.dmp
    Filesize

    64KB

  • memory/2772-135-0x00000000012E0000-0x00000000012F0000-memory.dmp
    Filesize

    64KB