Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 07:42

General

  • Target

    64d93720e8df5ace4b8b2b7071219a60.exe

  • Size

    26KB

  • MD5

    64d93720e8df5ace4b8b2b7071219a60

  • SHA1

    4e819f44dc9dc3a0b9d251e893a3a05aa7869301

  • SHA256

    1453e149ff91aab74a9da067cfb8a7f745833a77cc886712569addaad9e86c90

  • SHA512

    5b17e737cbd5b28265a47b0562659567169446bc69d7e47a791c1f005b071c2e4968184cc4e062a2eda276e5a367df786141b760f106a5bd97db3fcc785737e0

  • SSDEEP

    384:33a2PoNoo7VVLp+mQYZLhqV8WWexmZ7a766jtJdAna6hf0xr30RLo/tMa:33oNo+eIq2WWeUZ7adH6hf0xr3MLYM

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64d93720e8df5ace4b8b2b7071219a60.exe
    "C:\Users\Admin\AppData\Local\Temp\64d93720e8df5ace4b8b2b7071219a60.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall set allowedprogram "C:\Users\Admin\AppData\Local\Temp\64d93720e8df5ace4b8b2b7071219a60.exe" enable
      2⤵
      • Modifies Windows Firewall
      PID:2756

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4956-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4956-1-0x0000000002030000-0x0000000002060000-memory.dmp

          Filesize

          192KB

        • memory/4956-2-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4956-3-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4956-5-0x0000000002030000-0x0000000002060000-memory.dmp

          Filesize

          192KB

        • memory/4956-9-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB