Analysis
-
max time kernel
2s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 11:22
Behavioral task
behavioral1
Sample
e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe
-
Size
11.6MB
-
MD5
9828527b85941dab905f7e18fb96e09c
-
SHA1
c958c29fc7a1fed97dd0736404586fd866cfe7bc
-
SHA256
e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf
-
SHA512
9a61ba4b29bc7f30441e198bba894c5e9ad72763b7420e3f917dba082ec926526122bfca0b8f8b0292aa0cc6b3b8e1a3ddcb7765a257f1a03cd53828c10fb80d
-
SSDEEP
196608:f+yOlYxYts8JwqqQ7TP4T6Ar2TDeSiyA5gQfvyM2/pjRqpfqCS9YvtxBKU:YpU5Q7TP4O3TDhx4fP2/X+fql96PBKU
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 4084 netsh.exe 3948 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 run.dat -
resource yara_rule behavioral2/memory/4792-0-0x0000000000400000-0x0000000001297000-memory.dmp upx behavioral2/memory/4792-9-0x0000000000400000-0x0000000001297000-memory.dmp upx behavioral2/files/0x0007000000023208-7.dat upx behavioral2/memory/1860-21-0x0000000000610000-0x0000000000EE6000-memory.dmp upx behavioral2/memory/1860-641-0x0000000000610000-0x0000000000EE6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46 PID 4792 wrote to memory of 1860 4792 e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe"C:\Users\Admin\AppData\Local\Temp\e4d2487ee0cc6e27b50e246c5bcb78101824f243f75798ee393c095748d00caf.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\run.dat.\run.dat2⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall delete rule name="¸ßÐÔÄÜ·´¹ÒÍø¹Ø·þÎñ(FLAGS)"3⤵PID:1016
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="¸ßÐÔÄÜ·´¹ÒÍø¹Ø·þÎñ(FLAGS)"4⤵
- Modifies Windows Firewall
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall add rule name = "¸ßÐÔÄÜ·´¹ÒÍø¹Ø·þÎñ(FLAGS)" dir=in action=allow protocol=TCP localport=any localip=any remoteip=any profile=any program="C:\Users\Admin\AppData\Local\Temp\run.dat"3⤵PID:2832
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name = "¸ßÐÔÄÜ·´¹ÒÍø¹Ø·þÎñ(FLAGS)" dir=in action=allow protocol=TCP localport=any localip=any remoteip=any profile=any program="C:\Users\Admin\AppData\Local\Temp\run.dat"1⤵
- Modifies Windows Firewall
PID:3948