Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 19:35
Behavioral task
behavioral1
Sample
a65150c7e6a1470efdeb95b92e40a5ea_JC.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
General
-
Target
a65150c7e6a1470efdeb95b92e40a5ea_JC.exe
-
Size
23KB
-
MD5
a65150c7e6a1470efdeb95b92e40a5ea
-
SHA1
0e876d2c5da0ce4f7887af1f1b48272c13aaf3ec
-
SHA256
f16873bf7953ec4a08c62a32dc6365c8a74303c09c723f4548e2ea3452eb0bbc
-
SHA512
a29eb17ff452f54dc0f273114c769f64bcf8aadcf129cc49555905120c7cdb58a8ce06e77852414782c84c2b13cf9118095e5985e33910b655db0c603e228312
-
SSDEEP
384:upc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZAz:ube9EJLN/yRpcnuF
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
a65150c7e6a1470efdeb95b92e40a5ea_JC.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27f71527bed7617b3e2e3f3ed8ecf225.exe a65150c7e6a1470efdeb95b92e40a5ea_JC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27f71527bed7617b3e2e3f3ed8ecf225.exe a65150c7e6a1470efdeb95b92e40a5ea_JC.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
a65150c7e6a1470efdeb95b92e40a5ea_JC.exedescription pid process Token: SeDebugPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: 33 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe Token: SeIncBasePriorityPrivilege 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a65150c7e6a1470efdeb95b92e40a5ea_JC.exedescription pid process target process PID 1016 wrote to memory of 2284 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe netsh.exe PID 1016 wrote to memory of 2284 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe netsh.exe PID 1016 wrote to memory of 2284 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe netsh.exe PID 1016 wrote to memory of 2284 1016 a65150c7e6a1470efdeb95b92e40a5ea_JC.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a65150c7e6a1470efdeb95b92e40a5ea_JC.exe"C:\Users\Admin\AppData\Local\Temp\a65150c7e6a1470efdeb95b92e40a5ea_JC.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\a65150c7e6a1470efdeb95b92e40a5ea_JC.exe" "a65150c7e6a1470efdeb95b92e40a5ea_JC.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2284
-