Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
64d93720e8df5ace4b8b2b7071219a60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
64d93720e8df5ace4b8b2b7071219a60.exe
Resource
win10v2004-20231215-en
General
-
Target
64d93720e8df5ace4b8b2b7071219a60.exe
-
Size
26KB
-
MD5
64d93720e8df5ace4b8b2b7071219a60
-
SHA1
4e819f44dc9dc3a0b9d251e893a3a05aa7869301
-
SHA256
1453e149ff91aab74a9da067cfb8a7f745833a77cc886712569addaad9e86c90
-
SHA512
5b17e737cbd5b28265a47b0562659567169446bc69d7e47a791c1f005b071c2e4968184cc4e062a2eda276e5a367df786141b760f106a5bd97db3fcc785737e0
-
SSDEEP
384:33a2PoNoo7VVLp+mQYZLhqV8WWexmZ7a766jtJdAna6hf0xr30RLo/tMa:33oNo+eIq2WWeUZ7adH6hf0xr3MLYM
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2756 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysrest32.exe = "C:\\Windows\\system32\\sysrest32.exe" 64d93720e8df5ace4b8b2b7071219a60.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sysrest.sys 64d93720e8df5ace4b8b2b7071219a60.exe File created C:\Windows\SysWOW64\sysrest32.exe 64d93720e8df5ace4b8b2b7071219a60.exe File opened for modification C:\Windows\SysWOW64\sysrest32.exe 64d93720e8df5ace4b8b2b7071219a60.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 2756 4956 64d93720e8df5ace4b8b2b7071219a60.exe 99 PID 4956 wrote to memory of 2756 4956 64d93720e8df5ace4b8b2b7071219a60.exe 99 PID 4956 wrote to memory of 2756 4956 64d93720e8df5ace4b8b2b7071219a60.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\64d93720e8df5ace4b8b2b7071219a60.exe"C:\Users\Admin\AppData\Local\Temp\64d93720e8df5ace4b8b2b7071219a60.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram "C:\Users\Admin\AppData\Local\Temp\64d93720e8df5ace4b8b2b7071219a60.exe" enable2⤵
- Modifies Windows Firewall
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1