Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe
Resource
win10v2004-20240508-en
General
-
Target
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe
-
Size
8.7MB
-
MD5
ec8e8acd33199e6890c68ba94e2f88c3
-
SHA1
6a21fb844acd21301ed9477343b6e667c08c18eb
-
SHA256
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95
-
SHA512
60609ad513571ada650b201d3bf91fb4a84e8a4b3c2d9d9ccf9a49bf5b948eeb078bd306bd4b264855247bc254e15c97c7ce814b573f4c1854997f26469f84f1
-
SSDEEP
196608:TL5h5tG5490qJX9eJih9RisOyce2wS5l1BhEhXyg+AoRm/mS/:35nGo0w9eJ4RiPVe2wS5HEhXR+AoR
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2584 netsh.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe -
Kills process with taskkill 1 IoCs
pid Process 2152 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2152 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2560 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 28 PID 2896 wrote to memory of 2560 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 28 PID 2896 wrote to memory of 2560 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 28 PID 2896 wrote to memory of 2560 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 28 PID 2560 wrote to memory of 2584 2560 cmd.exe 30 PID 2560 wrote to memory of 2584 2560 cmd.exe 30 PID 2560 wrote to memory of 2584 2560 cmd.exe 30 PID 2560 wrote to memory of 2584 2560 cmd.exe 30 PID 2896 wrote to memory of 2152 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 35 PID 2896 wrote to memory of 2152 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 35 PID 2896 wrote to memory of 2152 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 35 PID 2896 wrote to memory of 2152 2896 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe"C:\Users\Admin\AppData\Local\Temp\0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c NetSh Advfirewall set allprofiles state off2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\netsh.exeNetSh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:2584
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM "0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe" /F /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2152
-