Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
61d67e67d5492a03cd4a04b11e6c737c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
61d67e67d5492a03cd4a04b11e6c737c.exe
Resource
win10v2004-20240802-en
General
-
Target
61d67e67d5492a03cd4a04b11e6c737c.exe
-
Size
4.3MB
-
MD5
61d67e67d5492a03cd4a04b11e6c737c
-
SHA1
f6ed2279bfd5fb2c42af498b4356ed460ff48d58
-
SHA256
e3cd90fe855b430449aa00f87f135fc4d61f6a5e592dcba177e9067b00ab632e
-
SHA512
e94be7bafe8e3ac5f9e703d777351fd60bdb3b78def6adec748c1d3d9867cd164a000bf0d82ef4b44ab9302866aeb7ffe8adf8c18e74b075c30f4213aafd0722
-
SSDEEP
98304:HEQQ7VWJEL5xZdj/MFScKbeppRZRxWwDv3yiv:khV35xHoAcMeVgwDvv
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 61d67e67d5492a03cd4a04b11e6c737c.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops file in System32 directory 4 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exedescription ioc Process File opened for modification C:\Windows\System32\GroupPolicy 61d67e67d5492a03cd4a04b11e6c737c.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 61d67e67d5492a03cd4a04b11e6c737c.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 61d67e67d5492a03cd4a04b11e6c737c.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 61d67e67d5492a03cd4a04b11e6c737c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exepid Process 2652 61d67e67d5492a03cd4a04b11e6c737c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
61d67e67d5492a03cd4a04b11e6c737c.exedescription pid Process procid_target PID 2652 wrote to memory of 2808 2652 61d67e67d5492a03cd4a04b11e6c737c.exe 31 PID 2652 wrote to memory of 2808 2652 61d67e67d5492a03cd4a04b11e6c737c.exe 31 PID 2652 wrote to memory of 2808 2652 61d67e67d5492a03cd4a04b11e6c737c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\61d67e67d5492a03cd4a04b11e6c737c.exe"C:\Users\Admin\AppData\Local\Temp\61d67e67d5492a03cd4a04b11e6c737c.exe"1⤵
- Modifies firewall policy service
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2652 -s 3722⤵PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005