Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-12-2023 03:19
Static task
static1
Behavioral task
behavioral1
Sample
Un_A.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Un_A.exe
Resource
win10v2004-20231215-en
General
-
Target
Un_A.exe
-
Size
80KB
-
MD5
66034ab42eee7e5d2ba7139d668e8f37
-
SHA1
3a558e0b48e288a5d6980e3baa44b82481c2261c
-
SHA256
bd7cb674391cf7779570544ce2b38ab9af123d2e5b3d00bc2e531e0527c04bf4
-
SHA512
84cd7a3a33aa2f19f4b5f0e823906d982268f56bd81441d95ecc990f92c909b0f83dbdd6466a887075d450a8b0b802ca6d04a45ff7403918ac57e164159231d4
-
SSDEEP
1536:DmL/t9u39UJJHefluwDEuddYeIAhSoFN9RDewHUz4Jb2JZ:DmpI39URWuwDEudduAhJSw0z4Jba
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 2668 netsh.exe 2680 netsh.exe 2796 netsh.exe -
Deletes itself 1 IoCs
pid Process 3052 Un_A.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3052 Un_A.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3052 3032 Un_A.exe 28 PID 3032 wrote to memory of 3052 3032 Un_A.exe 28 PID 3032 wrote to memory of 3052 3032 Un_A.exe 28 PID 3032 wrote to memory of 3052 3032 Un_A.exe 28 PID 3032 wrote to memory of 3052 3032 Un_A.exe 28 PID 3032 wrote to memory of 3052 3032 Un_A.exe 28 PID 3032 wrote to memory of 3052 3032 Un_A.exe 28 PID 3052 wrote to memory of 2668 3052 Un_A.exe 29 PID 3052 wrote to memory of 2668 3052 Un_A.exe 29 PID 3052 wrote to memory of 2668 3052 Un_A.exe 29 PID 3052 wrote to memory of 2668 3052 Un_A.exe 29 PID 3052 wrote to memory of 2680 3052 Un_A.exe 31 PID 3052 wrote to memory of 2680 3052 Un_A.exe 31 PID 3052 wrote to memory of 2680 3052 Un_A.exe 31 PID 3052 wrote to memory of 2680 3052 Un_A.exe 31 PID 3052 wrote to memory of 2796 3052 Un_A.exe 33 PID 3052 wrote to memory of 2796 3052 Un_A.exe 33 PID 3052 wrote to memory of 2796 3052 Un_A.exe 33 PID 3052 wrote to memory of 2796 3052 Un_A.exe 33 PID 3052 wrote to memory of 2756 3052 Un_A.exe 35 PID 3052 wrote to memory of 2756 3052 Un_A.exe 35 PID 3052 wrote to memory of 2756 3052 Un_A.exe 35 PID 3052 wrote to memory of 2756 3052 Un_A.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\Un_A.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Falcon BMS 4.36"3⤵
- Modifies Windows Firewall
PID:2668
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="IVC Server 4.36"3⤵
- Modifies Windows Firewall
PID:2680
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="RTT Server 4.36"3⤵
- Modifies Windows Firewall
PID:2796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -WindowStyle Hidden -File .\exclude.ps1 -FFFeatureOff3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD50f3546149b2fac36cd382bcbf6c37a00
SHA19272a55e8822524162264249ec5eae42f846f3b3
SHA256ce26a2d890ca44e188f7899265f3e9ceaa953389af684416475d6be7e212e06e
SHA512abcb14c2b9db20c6d3ff48c674e1895d897a74aa8523ebe5a57080fc415f165cc0b4eee234b32b331f505a77ecc1526141ffbb141c4b6ccd6b6ec329efe8d9e5
-
Filesize
80KB
MD566034ab42eee7e5d2ba7139d668e8f37
SHA13a558e0b48e288a5d6980e3baa44b82481c2261c
SHA256bd7cb674391cf7779570544ce2b38ab9af123d2e5b3d00bc2e531e0527c04bf4
SHA51284cd7a3a33aa2f19f4b5f0e823906d982268f56bd81441d95ecc990f92c909b0f83dbdd6466a887075d450a8b0b802ca6d04a45ff7403918ac57e164159231d4