Analysis
-
max time kernel
136s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 12:03
Static task
static1
Behavioral task
behavioral1
Sample
6d02676a0f97685a05edd42c3e4834f8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d02676a0f97685a05edd42c3e4834f8.exe
Resource
win10v2004-20231215-en
General
-
Target
6d02676a0f97685a05edd42c3e4834f8.exe
-
Size
15KB
-
MD5
6d02676a0f97685a05edd42c3e4834f8
-
SHA1
3d19c9b99f46d519dddf0fb73bd610c2ab0e3659
-
SHA256
81871c4bfca25f6867a4e9d9537e5b6145d94db3d96f751b64e10218b3c8272f
-
SHA512
c6a416cef34edb1c1f2ecaf12b9cde0b5dfd8cff7f34676baa0d8587a5cbbc37b8cfdd410a8b5dadee1fdf275ca4b37e3d84cefec7cd0db52121a7fb6670553d
-
SSDEEP
192:E5SoysZLdcfCePsZE1ByjSkPi2QwtjQl/AlXBM8dJvIkhffzzsrlufW9LCn:JolZLdaIE1AA2QAjQlolBdWCfHO4q6
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4520 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\wind32.exe" 6d02676a0f97685a05edd42c3e4834f8.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\wind32.exe 6d02676a0f97685a05edd42c3e4834f8.exe File opened for modification C:\Windows\SysWOW64\wind32.exe 6d02676a0f97685a05edd42c3e4834f8.exe File opened for modification C:\Windows\SysWOW64\dllgh8jkd1q8.exe 6d02676a0f97685a05edd42c3e4834f8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1288 wrote to memory of 4520 1288 6d02676a0f97685a05edd42c3e4834f8.exe 90 PID 1288 wrote to memory of 4520 1288 6d02676a0f97685a05edd42c3e4834f8.exe 90 PID 1288 wrote to memory of 4520 1288 6d02676a0f97685a05edd42c3e4834f8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d02676a0f97685a05edd42c3e4834f8.exe"C:\Users\Admin\AppData\Local\Temp\6d02676a0f97685a05edd42c3e4834f8.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram 'C:\Users\Admin\AppData\Local\Temp\6d02676a0f97685a05edd42c3e4834f8.exe' enable2⤵
- Modifies Windows Firewall
PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1