Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
4120432aa1aa920e3323e624e5d035cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4120432aa1aa920e3323e624e5d035cf.exe
Resource
win10v2004-20231215-en
General
-
Target
4120432aa1aa920e3323e624e5d035cf.exe
-
Size
432KB
-
MD5
4120432aa1aa920e3323e624e5d035cf
-
SHA1
07cc86d8db6f310dfb21c364433bae9f946a767b
-
SHA256
19ef8f8adf541a2c074f6c91c37df31dc3661a15874ef87e63a14afdd18fbcdd
-
SHA512
99902297991127bee9802b3abbed34e1cf164519b2db77bf6b827b97f39e59b7fc795d8c0150c187da106879a63ff5278ff773ad54d9df25cfb95dea1c8a9a56
-
SSDEEP
6144:nBF91mWdWdoADYwUdZMPCn4jF9GZtMtGOkq84BVMfj:l1mjeWZcMPY4jFAZxhq84BVML
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 4120432aa1aa920e3323e624e5d035cf.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\4120432aa1aa920e3323e624e5d035cf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4120432aa1aa920e3323e624e5d035cf.exe:*:Enabled:@xpsp2res.dll,-22019" 4120432aa1aa920e3323e624e5d035cf.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 4120432aa1aa920e3323e624e5d035cf.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3020 set thread context of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 9644 set thread context of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 3020 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeAuditPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeBackupPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeChangeNotifyPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeCreatePagefilePrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeCreatePermanentPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeCreatePermanentPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeCreateTokenPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeIncBasePriorityPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeIncreaseQuotaPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeLoadDriverPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeLockMemoryPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeMachineAccountPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeProfSingleProcessPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeRemoteShutdownPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeRestorePrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeSecurityPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeShutdownPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeSystemEnvironmentPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeSystemProfilePrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeSystemtimePrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeTakeOwnershipPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeTcbPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe Token: SeDebugPrivilege 9644 4120432aa1aa920e3323e624e5d035cf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 4120432aa1aa920e3323e624e5d035cf.exe 9644 4120432aa1aa920e3323e624e5d035cf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 3020 wrote to memory of 9644 3020 4120432aa1aa920e3323e624e5d035cf.exe 28 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29 PID 9644 wrote to memory of 2580 9644 4120432aa1aa920e3323e624e5d035cf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4120432aa1aa920e3323e624e5d035cf.exe"C:\Users\Admin\AppData\Local\Temp\4120432aa1aa920e3323e624e5d035cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\4120432aa1aa920e3323e624e5d035cf.exeC:\Users\Admin\AppData\Local\Temp\4120432aa1aa920e3323e624e5d035cf.exe2⤵
- Modifies firewall policy service
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:9644 -
C:\Users\Admin\AppData\Local\Temp\4120432aa1aa920e3323e624e5d035cf.exeC:\Users\Admin\AppData\Local\Temp\4120432aa1aa920e3323e624e5d035cf.exe -f3⤵PID:2580
-
-