Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe
Resource
win10v2004-20240508-en
General
-
Target
8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe
-
Size
16KB
-
MD5
b51320bb9f7b28568645aab5617e7067
-
SHA1
58fb6894bc6d25e333fcf2afadf512c7b2b3f0d3
-
SHA256
8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000
-
SHA512
375cebeb7a4f8393e1e3f2ad4485814da929c605f02ac2493aa4538e1b229d88175f9c56129eca03d44ebfbf9c77dbeddf9fe8ed24049f65f709b8aeeadac10d
-
SSDEEP
384:amhf8k06sQyZNpa63IZ0ivDk5X7Isblb4Ll1nLdnWPO:RsQyZNp/3IZ0+Dk5X7Isblb4LlVdnN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 36 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2704 netsh.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2376 2244 8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe 29 PID 2244 wrote to memory of 2376 2244 8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe 29 PID 2244 wrote to memory of 2376 2244 8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe 29 PID 2376 wrote to memory of 2704 2376 cmd.exe 31 PID 2376 wrote to memory of 2704 2376 cmd.exe 31 PID 2376 wrote to memory of 2704 2376 cmd.exe 31 PID 2376 wrote to memory of 1096 2376 cmd.exe 32 PID 2376 wrote to memory of 1096 2376 cmd.exe 32 PID 2376 wrote to memory of 1096 2376 cmd.exe 32 PID 2376 wrote to memory of 2624 2376 cmd.exe 33 PID 2376 wrote to memory of 2624 2376 cmd.exe 33 PID 2376 wrote to memory of 2624 2376 cmd.exe 33 PID 2376 wrote to memory of 2744 2376 cmd.exe 34 PID 2376 wrote to memory of 2744 2376 cmd.exe 34 PID 2376 wrote to memory of 2744 2376 cmd.exe 34 PID 2376 wrote to memory of 2668 2376 cmd.exe 35 PID 2376 wrote to memory of 2668 2376 cmd.exe 35 PID 2376 wrote to memory of 2668 2376 cmd.exe 35 PID 2376 wrote to memory of 2100 2376 cmd.exe 36 PID 2376 wrote to memory of 2100 2376 cmd.exe 36 PID 2376 wrote to memory of 2100 2376 cmd.exe 36 PID 2376 wrote to memory of 2548 2376 cmd.exe 37 PID 2376 wrote to memory of 2548 2376 cmd.exe 37 PID 2376 wrote to memory of 2548 2376 cmd.exe 37 PID 2376 wrote to memory of 2708 2376 cmd.exe 38 PID 2376 wrote to memory of 2708 2376 cmd.exe 38 PID 2376 wrote to memory of 2708 2376 cmd.exe 38 PID 2376 wrote to memory of 2784 2376 cmd.exe 39 PID 2376 wrote to memory of 2784 2376 cmd.exe 39 PID 2376 wrote to memory of 2784 2376 cmd.exe 39 PID 2376 wrote to memory of 2628 2376 cmd.exe 40 PID 2376 wrote to memory of 2628 2376 cmd.exe 40 PID 2376 wrote to memory of 2628 2376 cmd.exe 40 PID 2376 wrote to memory of 2544 2376 cmd.exe 41 PID 2376 wrote to memory of 2544 2376 cmd.exe 41 PID 2376 wrote to memory of 2544 2376 cmd.exe 41 PID 2376 wrote to memory of 2428 2376 cmd.exe 42 PID 2376 wrote to memory of 2428 2376 cmd.exe 42 PID 2376 wrote to memory of 2428 2376 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe"C:\Users\Admin\AppData\Local\Temp\8adc4888f11ccbeab73928c5f059c77205a7ce146e2d1a747fc99a0a8decb000.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\i0od3BLh.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\netsh.exenetsh ipsec static exportpolicy ip.ipsec3⤵
- Event Triggered Execution: Netsh Helper DLL
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\system32\netsh.exenetsh ipsec static delete policy name=abandon3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1096
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add policy name=abandon3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2624
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add filterlist name=denyip3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2744
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add filter filterlist=denyip srcaddr=0.0.0.0 dstaddr=216.239.36.213⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2668
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add filter filterlist=denyip srcaddr=0.0.0.0 dstaddr=61.143.60.833⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2100
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add filter filterlist=denyip srcaddr=0.0.0.0 dstaddr=112.91.151.373⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2548
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add filter filterlist=denyip srcaddr=0.0.0.0 dstaddr=14.136.207.423⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2708
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add filter filterlist=denyip srcaddr=0.0.0.0 dstaddr=61.143.60.843⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2784
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add filteraction name=denyact action=block3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2628
-
-
C:\Windows\system32\netsh.exenetsh ipsec static add rule name=killu policy=abandon filterlist=denyip filteraction=denyact3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2544
-
-
C:\Windows\system32\netsh.exenetsh ipsec static set policy name=abandon assign=y3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5820f8041f0db5eb4c4208da13e90dabd
SHA1ffc81fd62ac8b7c689ff4537644a3147ee1e25f1
SHA2567d32883a14c09c558940ea9cb998a3aafb40613e334e6108c3863d25c05fc6e1
SHA512d1cb69cc6470354d2e71f5ba10c1640c46a7eb51d743abd72a1cb464c2aefc3c7ee20983082336e6e68c5fc5684a455d0cd97e1c170d63ea340e34b7a251923e