Analysis
-
max time kernel
153s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 11:33
Behavioral task
behavioral1
Sample
aaa.exe
Resource
win7-20230712-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
aaa.exe
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
aaa.exe
-
Size
23KB
-
MD5
dd20d42a1555ecd374d47c41bfab8417
-
SHA1
374e9490ab73d7e9d0cf225d0e96d2ca77becbfb
-
SHA256
c37bcf56f3404eee897781ecdf994f8c733dcc0a402fa21bd440756a1467ae83
-
SHA512
a260e1b7de92028aff2b379972f9199948460dcc1d81ce86389226edeef3559f8fed2f468da998172374690efb414559ec4e8528be746d0e955136d91e52266b
-
SSDEEP
384:QMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZKm:zb9glF51LRpcnuW
Score
10/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2440 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows\CurrentVersion\Run\33a8054157a3a1616c2f71e43acb6e31 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aaa.exe\" .." aaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\33a8054157a3a1616c2f71e43acb6e31 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aaa.exe\" .." aaa.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe Token: 33 1508 aaa.exe Token: SeIncBasePriorityPrivilege 1508 aaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2440 1508 aaa.exe 30 PID 1508 wrote to memory of 2440 1508 aaa.exe 30 PID 1508 wrote to memory of 2440 1508 aaa.exe 30 PID 1508 wrote to memory of 2440 1508 aaa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa.exe"C:\Users\Admin\AppData\Local\Temp\aaa.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\aaa.exe" "aaa.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2440
-