Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 20:06
Behavioral task
behavioral1
Sample
CEE364A8874C51C46545841113BD0EDD.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CEE364A8874C51C46545841113BD0EDD.exe
Resource
win10v2004-20231222-en
General
-
Target
CEE364A8874C51C46545841113BD0EDD.exe
-
Size
23KB
-
MD5
cee364a8874c51c46545841113bd0edd
-
SHA1
271efcea6c3518b9127470afabbf2b8a00ef59c2
-
SHA256
bd523059a2fecc46b359e559321dbc1986177ef5432299bc3c84ce4b3140d866
-
SHA512
6bcc338f000ba4d832fe9e105d98e1770258b7fce222380f9808e33028cbde7d4cbc8e33e887353e0eb1686653229b0e244524e54eff5f9450fc9401e37915db
-
SSDEEP
384:CY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3tVmRvR6JZlbw8hqIusZzZag:VL2s+tRdRpcnuU
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2024 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\3378fb27680d4a9a06e6f191501123e0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\CEE364A8874C51C46545841113BD0EDD.exe\" .." CEE364A8874C51C46545841113BD0EDD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3378fb27680d4a9a06e6f191501123e0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\CEE364A8874C51C46545841113BD0EDD.exe\" .." CEE364A8874C51C46545841113BD0EDD.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: 33 2216 CEE364A8874C51C46545841113BD0EDD.exe Token: SeIncBasePriorityPrivilege 2216 CEE364A8874C51C46545841113BD0EDD.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2024 2216 CEE364A8874C51C46545841113BD0EDD.exe 28 PID 2216 wrote to memory of 2024 2216 CEE364A8874C51C46545841113BD0EDD.exe 28 PID 2216 wrote to memory of 2024 2216 CEE364A8874C51C46545841113BD0EDD.exe 28 PID 2216 wrote to memory of 2024 2216 CEE364A8874C51C46545841113BD0EDD.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\CEE364A8874C51C46545841113BD0EDD.exe"C:\Users\Admin\AppData\Local\Temp\CEE364A8874C51C46545841113BD0EDD.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\CEE364A8874C51C46545841113BD0EDD.exe" "CEE364A8874C51C46545841113BD0EDD.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1