Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 14:15
Behavioral task
behavioral1
Sample
a3fe854723ec37a910eb2c9924b941ea.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3fe854723ec37a910eb2c9924b941ea.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
a3fe854723ec37a910eb2c9924b941ea.exe
-
Size
37KB
-
MD5
a3fe854723ec37a910eb2c9924b941ea
-
SHA1
6e6120b5c83e5f997156d0a16b9fa8ffe9a983f9
-
SHA256
0d65aac1dc725db5e6893fb97b2e2401b91ffc7fd2903e7a3c476e8701e202c5
-
SHA512
d7cb20f60e73901be9d570ff7c49bf0fcc63548dfc099284432618f465a2de91f7c758262310758dff7e05b21998bf0dcff49074f252edd992a9dd4f20a538ee
-
SSDEEP
384:Jste5aNitbFbOn0aH2ykrkmPbZ4znCSqrAF+rMRTyN/0L+EcoinblneHQM3epzXd:2t7MNWtkrkmzuDCFrM+rMRa8Nu66t
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5020 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 27 2.tcp.ngrok.io 49 2.tcp.ngrok.io 72 2.tcp.ngrok.io -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 4380 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 4380 a3fe854723ec37a910eb2c9924b941ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4380 wrote to memory of 5020 4380 a3fe854723ec37a910eb2c9924b941ea.exe 91 PID 4380 wrote to memory of 5020 4380 a3fe854723ec37a910eb2c9924b941ea.exe 91 PID 4380 wrote to memory of 5020 4380 a3fe854723ec37a910eb2c9924b941ea.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3fe854723ec37a910eb2c9924b941ea.exe"C:\Users\Admin\AppData\Local\Temp\a3fe854723ec37a910eb2c9924b941ea.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\a3fe854723ec37a910eb2c9924b941ea.exe" "a3fe854723ec37a910eb2c9924b941ea.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:5020
-