Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 01:35
Behavioral task
behavioral1
Sample
3f913d513d97eb3ca8c8700f7de58fe4.exe
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
3f913d513d97eb3ca8c8700f7de58fe4.exe
-
Size
143KB
-
MD5
3f913d513d97eb3ca8c8700f7de58fe4
-
SHA1
c4ab3eaf01090a6751fa9b6878714cad99e493aa
-
SHA256
4fc794f0028f3adb7b8efb6e02a196310ca9edde439ae8ac47f51b485d0eceaf
-
SHA512
eda3c24ff4cce392475555dc250268ec4bf0b7eeb155d95d76125c09c288db76419d00aa53db12bd95c668be0de162b2cbb01c4dcd0080a294e7da3298de9bee
-
SSDEEP
3072:ARFHEVUkrbJqMn+3WAXqmLe8Q+9NO+4nU6QVW6hiq3/IX5jLVoutq:AR2VJxqz3WAXqmLeCNV6QVNEq3WpoS
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3f913d513d97eb3ca8c8700f7de58fe4.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\bot.exe = "C:\\Users\\Admin\\AppData\\Roaming\\bot.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
resource yara_rule behavioral2/memory/936-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4560-5-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/936-6-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4560-8-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-3-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-14-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-15-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-16-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-18-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-19-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-20-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-21-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-22-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-23-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4560-26-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 936 set thread context of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4596 reg.exe 5028 reg.exe 3980 reg.exe 4904 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeCreateTokenPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeAssignPrimaryTokenPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeLockMemoryPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeIncreaseQuotaPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeMachineAccountPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeTcbPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeSecurityPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeTakeOwnershipPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeLoadDriverPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeSystemProfilePrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeSystemtimePrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeProfSingleProcessPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeIncBasePriorityPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeCreatePagefilePrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeCreatePermanentPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeBackupPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeRestorePrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeShutdownPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeDebugPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeAuditPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeSystemEnvironmentPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeChangeNotifyPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeRemoteShutdownPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeUndockPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeSyncAgentPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeEnableDelegationPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeManageVolumePrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeImpersonatePrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: SeCreateGlobalPrivilege 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: 31 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: 32 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: 33 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: 34 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe Token: 35 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 936 wrote to memory of 4560 936 3f913d513d97eb3ca8c8700f7de58fe4.exe 23 PID 4560 wrote to memory of 4032 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 35 PID 4560 wrote to memory of 4032 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 35 PID 4560 wrote to memory of 4032 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 35 PID 4560 wrote to memory of 4680 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 34 PID 4560 wrote to memory of 4680 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 34 PID 4560 wrote to memory of 4680 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 34 PID 4560 wrote to memory of 2160 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 33 PID 4560 wrote to memory of 2160 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 33 PID 4560 wrote to memory of 2160 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 33 PID 4560 wrote to memory of 1672 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 32 PID 4560 wrote to memory of 1672 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 32 PID 4560 wrote to memory of 1672 4560 3f913d513d97eb3ca8c8700f7de58fe4.exe 32 PID 1672 wrote to memory of 4596 1672 cmd.exe 29 PID 1672 wrote to memory of 4596 1672 cmd.exe 29 PID 1672 wrote to memory of 4596 1672 cmd.exe 29 PID 4032 wrote to memory of 3980 4032 cmd.exe 27 PID 4032 wrote to memory of 3980 4032 cmd.exe 27 PID 4032 wrote to memory of 3980 4032 cmd.exe 27 PID 4680 wrote to memory of 4904 4680 cmd.exe 28 PID 4680 wrote to memory of 4904 4680 cmd.exe 28 PID 4680 wrote to memory of 4904 4680 cmd.exe 28 PID 2160 wrote to memory of 5028 2160 cmd.exe 26 PID 2160 wrote to memory of 5028 2160 cmd.exe 26 PID 2160 wrote to memory of 5028 2160 cmd.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe"C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exeC:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1672
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2160
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4680
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4032
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:5028
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:3980
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\3f913d513d97eb3ca8c8700f7de58fe4.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:4904
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:4596