Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
25-07-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe
Resource
win10-20240611-en
General
-
Target
734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe
-
Size
2.7MB
-
MD5
7e01323b38be0c94227d303769a1ab71
-
SHA1
501178f5af9c06993deb091735b4c8e787bd8d79
-
SHA256
734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1
-
SHA512
9f941aa9d41ee80330f344524cd9ebe5f0d5715bb0af9fe86a5f1d236fc8d53f875c43f8d32a19c8bcc44a5a062b7452387ac559c204a5f4737a7661bdb5610c
-
SSDEEP
49152:ULP35wajHbTtyvl3VDF9hInnrTE0eKHfm59Dxg23eVLDl3mnAGddgy0m:Ur35wYovlFRwk0Un1lo0nZ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.myip.com 6 api.myip.com 7 ipinfo.io 8 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy 734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1596 734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe 1596 734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe"C:\Users\Admin\AppData\Local\Temp\734da3101726c8a040ebe6c2131dc8eb129a0ec92fe3f0d4111e26809d4fc2d1.exe"1⤵
- Modifies firewall policy service
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2152