Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:21
Behavioral task
behavioral1
Sample
pweijn8t8c.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
pweijn8t8c.exe
-
Size
31KB
-
MD5
d16886dc04d9ce85c604088c886b8fd5
-
SHA1
49653245efb1cfe5eee9b3452bb83c6718ba5c2f
-
SHA256
d422eaabc8ad234cbfe79ef20dbbd6386fa5a367c9da869a33cac7379830a6d7
-
SHA512
b1bfa78a37e9e8a957c8ff4203f607e952dfa46e0ff3d22706e0d3d44c10f60a2f24f73559d63c5ad919b06b71920b79f8c6b4fad92d57ff8e49c9732f2f82fc
-
SSDEEP
768:njMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0tiWmj:ikKdisvQVkQj
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2120 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
pweijn8t8c.exedescription pid process Token: SeDebugPrivilege 208 pweijn8t8c.exe Token: 33 208 pweijn8t8c.exe Token: SeIncBasePriorityPrivilege 208 pweijn8t8c.exe Token: 33 208 pweijn8t8c.exe Token: SeIncBasePriorityPrivilege 208 pweijn8t8c.exe Token: 33 208 pweijn8t8c.exe Token: SeIncBasePriorityPrivilege 208 pweijn8t8c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
pweijn8t8c.exedescription pid process target process PID 208 wrote to memory of 2120 208 pweijn8t8c.exe netsh.exe PID 208 wrote to memory of 2120 208 pweijn8t8c.exe netsh.exe PID 208 wrote to memory of 2120 208 pweijn8t8c.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pweijn8t8c.exe"C:\Users\Admin\AppData\Local\Temp\pweijn8t8c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\pweijn8t8c.exe" "pweijn8t8c.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:2120
-