Analysis
-
max time kernel
33s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 00:54
Behavioral task
behavioral1
Sample
wscript.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
wscript.exe
Resource
win10v2004-20240412-en
General
-
Target
wscript.exe
-
Size
93KB
-
MD5
50af5e7d5d665f6e9cca447af7e8b1e5
-
SHA1
8cde307749103cf895cd8c2d87a8a73aa1017fa8
-
SHA256
c7cc2d0b72eba9ef36f0ec9ad721b8a9e0dbaacb9121ccbead85b9751eb6f45b
-
SHA512
abdcb709f2c1c7e951b9f4a61b0766db965376476043fba7c8f182740ece3e2be6ca2e7a66e09c1327274af2f507fb2cf3f5e39b2b80619f5aa33b8fb28117e2
-
SSDEEP
768:QY3CUfhWXxyFcxovUKUJuROprXtWNEpeYhYbmXxrjEtCdnl2pi1Rz4Rk3lsGdpc3:KU5WhIUKcuOJRpPhBjEwzGi1dD1DcgS
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2176 netsh.exe -
Drops startup file 4 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7cf4c2536f30115b1e3e9ebf8675233aWindows Update.exe wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7cf4c2536f30115b1e3e9ebf8675233aWindows Update.exe wscript.exe -
Drops file in System32 directory 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Windows\SysWOW64\Explower.exe wscript.exe File opened for modification C:\Windows\SysWOW64\Explower.exe wscript.exe -
Drops file in Program Files directory 2 IoCs
Processes:
wscript.exedescription ioc process File opened for modification C:\Program Files (x86)\Explower.exe wscript.exe File created C:\Program Files (x86)\Explower.exe wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
wscript.exepid process 2220 wscript.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
wscript.exedescription pid process Token: SeDebugPrivilege 2220 wscript.exe Token: 33 2220 wscript.exe Token: SeIncBasePriorityPrivilege 2220 wscript.exe Token: 33 2220 wscript.exe Token: SeIncBasePriorityPrivilege 2220 wscript.exe Token: 33 2220 wscript.exe Token: SeIncBasePriorityPrivilege 2220 wscript.exe Token: 33 2220 wscript.exe Token: SeIncBasePriorityPrivilege 2220 wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 2220 wrote to memory of 2176 2220 wscript.exe netsh.exe PID 2220 wrote to memory of 2176 2220 wscript.exe netsh.exe PID 2220 wrote to memory of 2176 2220 wscript.exe netsh.exe PID 2220 wrote to memory of 2176 2220 wscript.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wscript.exe"C:\Users\Admin\AppData\Local\Temp\wscript.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\wscript.exe" "wscript.exe" ENABLE2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Explower.exeFilesize
93KB
MD550af5e7d5d665f6e9cca447af7e8b1e5
SHA18cde307749103cf895cd8c2d87a8a73aa1017fa8
SHA256c7cc2d0b72eba9ef36f0ec9ad721b8a9e0dbaacb9121ccbead85b9751eb6f45b
SHA512abdcb709f2c1c7e951b9f4a61b0766db965376476043fba7c8f182740ece3e2be6ca2e7a66e09c1327274af2f507fb2cf3f5e39b2b80619f5aa33b8fb28117e2
-
memory/2220-0-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2220-1-0x0000000000C30000-0x0000000000C70000-memory.dmpFilesize
256KB
-
memory/2220-2-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2220-13-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2220-14-0x0000000000C30000-0x0000000000C70000-memory.dmpFilesize
256KB