Analysis
-
max time kernel
166s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
3536946859f8eb6a48e89acc386c64d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3536946859f8eb6a48e89acc386c64d9.exe
Resource
win10v2004-20231215-en
General
-
Target
3536946859f8eb6a48e89acc386c64d9.exe
-
Size
116KB
-
MD5
3536946859f8eb6a48e89acc386c64d9
-
SHA1
2d66aed420f00d004b3c59e0754c78f24ddc0b9a
-
SHA256
4bc648f7bd3b5828f50cb0224cfc044ef4c48404d29f224d23e16d5b96d9d5d9
-
SHA512
c445beb5d9870c42deb0361cc176e11e18fa77b2b035ab3f088d9004e07c53ecaa6e9b85eb747bc7a87d767991f085d3ac290539a6dc0cf79026fc9299b443e9
-
SSDEEP
1536:jrQSpOrypW7uAq8+t5pIEOKO9+SZQUqdueOL9IPdVchC:j0SpOrygS8+tHBOKO9+8YkmPdV8
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 3536946859f8eb6a48e89acc386c64d9.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 3536946859f8eb6a48e89acc386c64d9.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 3536946859f8eb6a48e89acc386c64d9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Firewall Host\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall Host\\cfmmon.exe" 3536946859f8eb6a48e89acc386c64d9.exe -
Executes dropped EXE 2 IoCs
pid Process 464 cfmmon.exe 2248 cfmmon.exe -
resource yara_rule behavioral2/memory/2676-3-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2676-5-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2676-8-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2676-6-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2676-13-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2248-25-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall Host\\cfmmon.exe" 3536946859f8eb6a48e89acc386c64d9.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3616 set thread context of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 464 set thread context of 2248 464 cfmmon.exe 97 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3616 3536946859f8eb6a48e89acc386c64d9.exe 464 cfmmon.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 3616 wrote to memory of 2676 3616 3536946859f8eb6a48e89acc386c64d9.exe 93 PID 2676 wrote to memory of 464 2676 3536946859f8eb6a48e89acc386c64d9.exe 94 PID 2676 wrote to memory of 464 2676 3536946859f8eb6a48e89acc386c64d9.exe 94 PID 2676 wrote to memory of 464 2676 3536946859f8eb6a48e89acc386c64d9.exe 94 PID 464 wrote to memory of 2248 464 cfmmon.exe 97 PID 464 wrote to memory of 2248 464 cfmmon.exe 97 PID 464 wrote to memory of 2248 464 cfmmon.exe 97 PID 464 wrote to memory of 2248 464 cfmmon.exe 97 PID 464 wrote to memory of 2248 464 cfmmon.exe 97 PID 464 wrote to memory of 2248 464 cfmmon.exe 97 PID 464 wrote to memory of 2248 464 cfmmon.exe 97 PID 464 wrote to memory of 2248 464 cfmmon.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3536946859f8eb6a48e89acc386c64d9.exe"C:\Users\Admin\AppData\Local\Temp\3536946859f8eb6a48e89acc386c64d9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\3536946859f8eb6a48e89acc386c64d9.exe"C:\Users\Admin\AppData\Local\Temp\3536946859f8eb6a48e89acc386c64d9.exe"2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\Firewall Host\cfmmon.exe"C:\Users\Admin\AppData\Roaming\Firewall Host\cfmmon.exe" in3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Roaming\Firewall Host\cfmmon.exe"C:\Users\Admin\AppData\Roaming\Firewall Host\cfmmon.exe"4⤵
- Executes dropped EXE
PID:2248
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD53536946859f8eb6a48e89acc386c64d9
SHA12d66aed420f00d004b3c59e0754c78f24ddc0b9a
SHA2564bc648f7bd3b5828f50cb0224cfc044ef4c48404d29f224d23e16d5b96d9d5d9
SHA512c445beb5d9870c42deb0361cc176e11e18fa77b2b035ab3f088d9004e07c53ecaa6e9b85eb747bc7a87d767991f085d3ac290539a6dc0cf79026fc9299b443e9