Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:21
Behavioral task
behavioral1
Sample
pweijn8t8c.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
pweijn8t8c.exe
-
Size
31KB
-
MD5
d16886dc04d9ce85c604088c886b8fd5
-
SHA1
49653245efb1cfe5eee9b3452bb83c6718ba5c2f
-
SHA256
d422eaabc8ad234cbfe79ef20dbbd6386fa5a367c9da869a33cac7379830a6d7
-
SHA512
b1bfa78a37e9e8a957c8ff4203f607e952dfa46e0ff3d22706e0d3d44c10f60a2f24f73559d63c5ad919b06b71920b79f8c6b4fad92d57ff8e49c9732f2f82fc
-
SSDEEP
768:njMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0tiWmj:ikKdisvQVkQj
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2320 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
pweijn8t8c.exedescription pid process Token: SeDebugPrivilege 1924 pweijn8t8c.exe Token: 33 1924 pweijn8t8c.exe Token: SeIncBasePriorityPrivilege 1924 pweijn8t8c.exe Token: 33 1924 pweijn8t8c.exe Token: SeIncBasePriorityPrivilege 1924 pweijn8t8c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
pweijn8t8c.exedescription pid process target process PID 1924 wrote to memory of 2320 1924 pweijn8t8c.exe netsh.exe PID 1924 wrote to memory of 2320 1924 pweijn8t8c.exe netsh.exe PID 1924 wrote to memory of 2320 1924 pweijn8t8c.exe netsh.exe PID 1924 wrote to memory of 2320 1924 pweijn8t8c.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pweijn8t8c.exe"C:\Users\Admin\AppData\Local\Temp\pweijn8t8c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\pweijn8t8c.exe" "pweijn8t8c.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2320
-