Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/10/2023, 17:51
Behavioral task
behavioral1
Sample
86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe
Resource
win10v2004-20230915-en
General
-
Target
86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe
-
Size
37KB
-
MD5
b1c48505476b3a11e79dd548d5bfd160
-
SHA1
18f2ef8d519d5bb024379fc18162074b7894f045
-
SHA256
86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c
-
SHA512
4ebb46cc4e5dffa6c950a8dd010482b08bcde0d132f2af355dc3d43244127ed82ca3a8986ce57444ef7ac77628d7e9a0ea5852069936abecf3562c831da1f926
-
SSDEEP
384:dUyAzLUiSiL1G5k2gyk/UQvhW/4kR6lBrAF+rMRTyN/0L+EcoinblneHQM3epzX5:uyAzL32bk/UQQwkR6TrM+rMRa8Nu2it
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2996 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b64e14bdbed1d7931c1e7a5c152f1a44.exe 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b64e14bdbed1d7931c1e7a5c152f1a44.exe 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows\CurrentVersion\Run\b64e14bdbed1d7931c1e7a5c152f1a44 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe\" .." 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\b64e14bdbed1d7931c1e7a5c152f1a44 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe\" .." 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: 33 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe Token: SeIncBasePriorityPrivilege 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2996 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe 28 PID 2472 wrote to memory of 2996 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe 28 PID 2472 wrote to memory of 2996 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe 28 PID 2472 wrote to memory of 2996 2472 86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe"C:\Users\Admin\AppData\Local\Temp\86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe" "86cf963fa249c552e9f8f4f7080bb9cacba0a42fc15c94528c3fe2745cc3d94c.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1