Analysis
-
max time kernel
157s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 14:08
Behavioral task
behavioral1
Sample
991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe
Resource
win7-20231020-en
windows7-x64
4 signatures
150 seconds
General
-
Target
991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe
-
Size
258KB
-
MD5
db1fba27d287736091a6d307a0ce6fd3
-
SHA1
8e5dc0dc09ba147dc4f06727f8b31546d344e315
-
SHA256
991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4
-
SHA512
01a86b4a680248c4390d0f682e7481f13f9f5a060b28a0feacdf5b61fa6433fbc241068fe50ca88200d87155ffeede17e93f89df352f584d70666b084b05c03b
-
SSDEEP
6144:DxTG9aW5M3/gDONqgrKhEip5GTpkGf6gEXl:DfWm32Eq6KhEiyTOQpE1
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 3508 netsh.exe 4936 netsh.exe -
resource yara_rule behavioral2/memory/4240-0-0x00000000001F0000-0x0000000000299000-memory.dmp upx behavioral2/memory/4240-1-0x00000000001F0000-0x0000000000299000-memory.dmp upx behavioral2/memory/4240-2-0x00000000001F0000-0x0000000000299000-memory.dmp upx behavioral2/memory/4240-7-0x00000000001F0000-0x0000000000299000-memory.dmp upx behavioral2/memory/4240-9-0x00000000001F0000-0x0000000000299000-memory.dmp upx behavioral2/memory/4240-10-0x00000000001F0000-0x0000000000299000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4936 4240 991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe 90 PID 4240 wrote to memory of 4936 4240 991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe 90 PID 4240 wrote to memory of 4936 4240 991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe 90 PID 4240 wrote to memory of 3508 4240 991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe 99 PID 4240 wrote to memory of 3508 4240 991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe 99 PID 4240 wrote to memory of 3508 4240 991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe"C:\Users\Admin\AppData\Local\Temp\991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Kon-Boot Installer"2⤵
- Modifies Windows Firewall
PID:4936
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Kon-Boot Installer" dir=out action=allow program="C:\Users\Admin\AppData\Local\Temp\991929a842e7103b02c244bf75709517304ec9f8d314764351714960353771f4.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3508
-