Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 05:52
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Server.exe
-
Size
36KB
-
MD5
da332c85afedb0fb2fcde8b4076b925c
-
SHA1
c938c87d5d805e7be993f896a4df857debb3a1a7
-
SHA256
fbb05c261096220dff4705d9ef5ffa9edf1ceaf06bbe13a5a6a0fd32b805b4c1
-
SHA512
517100f04cdae13ade4a2fc973e08a040637ae0e43117a423d73ce3f58ca6e7f3d1965717b1622feee74ae7fc496537ffbcf87f76582065c4f4ed285a035ff3c
-
SSDEEP
384:pmOs0IiejvCVLO309QmykrtG+dA+VfwvOSiKrAF+rMRTyN/0L+EcoinblneHQM3a:7FdGdkrgYRwWS9rM+rMRa8NuBht
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
Server.exedescription pid process Token: SeDebugPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe Token: 33 1436 Server.exe Token: SeIncBasePriorityPrivilege 1436 Server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Server.exedescription pid process target process PID 1436 wrote to memory of 1444 1436 Server.exe netsh.exe PID 1436 wrote to memory of 1444 1436 Server.exe netsh.exe PID 1436 wrote to memory of 1444 1436 Server.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE2⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1436-133-0x00000000016B0000-0x00000000016C0000-memory.dmpFilesize
64KB
-
memory/1436-134-0x00000000016B0000-0x00000000016C0000-memory.dmpFilesize
64KB
-
memory/1436-135-0x00000000016B0000-0x00000000016C0000-memory.dmpFilesize
64KB
-
memory/1436-136-0x00000000016B0000-0x00000000016C0000-memory.dmpFilesize
64KB