Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 05:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
03f00d915471f6f5d16aab035cd9200c.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
03f00d915471f6f5d16aab035cd9200c.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
03f00d915471f6f5d16aab035cd9200c.exe
-
Size
468KB
-
MD5
03f00d915471f6f5d16aab035cd9200c
-
SHA1
3c03852587aa81e4742c2b44ec4f2c85ca23391b
-
SHA256
ecd02ac8840e6a25878d9bfaef803f193e1f4b9faa2fba7e1ed5014ca969f1c4
-
SHA512
64b56aaa402c0582222d7dbf735fd8f7f0608ead07740afc0e559eacaa0686aed43f08a3e7909becd3a5ac52e79403f644b1a736287b9e6cc853566094bd42f2
-
SSDEEP
6144:U/Aa7Korb7gp6/pDxUC6eVy5QetdHZwJvJMxhnel93mdQoCX:8JKqb7gpMyIVnAFZwJxEh
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2204 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1936 03f00d915471f6f5d16aab035cd9200c.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 1936 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 1936 03f00d915471f6f5d16aab035cd9200c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2204 1936 03f00d915471f6f5d16aab035cd9200c.exe 28 PID 1936 wrote to memory of 2204 1936 03f00d915471f6f5d16aab035cd9200c.exe 28 PID 1936 wrote to memory of 2204 1936 03f00d915471f6f5d16aab035cd9200c.exe 28 PID 1936 wrote to memory of 2204 1936 03f00d915471f6f5d16aab035cd9200c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\03f00d915471f6f5d16aab035cd9200c.exe"C:\Users\Admin\AppData\Local\Temp\03f00d915471f6f5d16aab035cd9200c.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\03f00d915471f6f5d16aab035cd9200c.exe" "03f00d915471f6f5d16aab035cd9200c.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2204
-