Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
61d67e67d5492a03cd4a04b11e6c737c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
61d67e67d5492a03cd4a04b11e6c737c.exe
Resource
win10v2004-20240802-en
General
-
Target
61d67e67d5492a03cd4a04b11e6c737c.exe
-
Size
4.3MB
-
MD5
61d67e67d5492a03cd4a04b11e6c737c
-
SHA1
f6ed2279bfd5fb2c42af498b4356ed460ff48d58
-
SHA256
e3cd90fe855b430449aa00f87f135fc4d61f6a5e592dcba177e9067b00ab632e
-
SHA512
e94be7bafe8e3ac5f9e703d777351fd60bdb3b78def6adec748c1d3d9867cd164a000bf0d82ef4b44ab9302866aeb7ffe8adf8c18e74b075c30f4213aafd0722
-
SSDEEP
98304:HEQQ7VWJEL5xZdj/MFScKbeppRZRxWwDv3yiv:khV35xHoAcMeVgwDvv
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 61d67e67d5492a03cd4a04b11e6c737c.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops file in System32 directory 4 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 61d67e67d5492a03cd4a04b11e6c737c.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 61d67e67d5492a03cd4a04b11e6c737c.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 61d67e67d5492a03cd4a04b11e6c737c.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 61d67e67d5492a03cd4a04b11e6c737c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exepid process 2264 61d67e67d5492a03cd4a04b11e6c737c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exedescription pid process target process PID 2264 wrote to memory of 2544 2264 61d67e67d5492a03cd4a04b11e6c737c.exe WerFault.exe PID 2264 wrote to memory of 2544 2264 61d67e67d5492a03cd4a04b11e6c737c.exe WerFault.exe PID 2264 wrote to memory of 2544 2264 61d67e67d5492a03cd4a04b11e6c737c.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61d67e67d5492a03cd4a04b11e6c737c.exe"C:\Users\Admin\AppData\Local\Temp\61d67e67d5492a03cd4a04b11e6c737c.exe"1⤵
- Modifies firewall policy service
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2264 -s 2322⤵PID:2544
-