Analysis
-
max time kernel
58s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
29-06-2023 00:39
Behavioral task
behavioral1
Sample
Servexxxr.exe
Resource
win7-20230621-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Servexxxr.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Servexxxr.exe
-
Size
93KB
-
MD5
bac3e3a27867ed4fec83edffd7cdf851
-
SHA1
ee1339a375d50b0aa1459543f2aacaab5c810c9c
-
SHA256
a2c863ccc540a385073d3b08ab8fb1ec6c1d23b599b57a13a604002cba27f2a4
-
SHA512
09ca8b12914d0da03797f8b34c7cd5f6ea42e94919d0c40270b88a110ee285372ad910b506311662a77620426a03dbf8cc8daccb6e9c4ddf6ece060f428b4721
-
SSDEEP
1536:1U33wHyNxrBhh5YLg1jEwzGi1dDbDEgS:1UKyNxrBhLggCi1dj9
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1556 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Servexxxr.exepid process 1204 Servexxxr.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
Servexxxr.exedescription pid process Token: SeDebugPrivilege 1204 Servexxxr.exe Token: 33 1204 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1204 Servexxxr.exe Token: 33 1204 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1204 Servexxxr.exe Token: 33 1204 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1204 Servexxxr.exe Token: 33 1204 Servexxxr.exe Token: SeIncBasePriorityPrivilege 1204 Servexxxr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Servexxxr.execmd.exedescription pid process target process PID 1204 wrote to memory of 2028 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 2028 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 2028 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 2028 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 336 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 336 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 336 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 336 1204 Servexxxr.exe netsh.exe PID 1204 wrote to memory of 1556 1204 Servexxxr.exe cmd.exe PID 1204 wrote to memory of 1556 1204 Servexxxr.exe cmd.exe PID 1204 wrote to memory of 1556 1204 Servexxxr.exe cmd.exe PID 1204 wrote to memory of 1556 1204 Servexxxr.exe cmd.exe PID 1556 wrote to memory of 796 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 796 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 796 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 796 1556 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe" "Servexxxr.exe" ENABLE2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Servexxxr.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- Runs ping.exe