Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe
Resource
win10v2004-20240802-en
General
-
Target
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe
-
Size
2.7MB
-
MD5
9312ea4eeda1a918922ae99a21aa1718
-
SHA1
14985e90b26b71b219116dd072a8ed6055aa5356
-
SHA256
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f
-
SHA512
fa1727bb597f93241abe718d1cb107c3a8e52dee6a2fc004f426215bda3aace50c1293a24bb5d670c1fd81dae2596623e4ae37bef4c0fc39c68af80d4362d625
-
SSDEEP
49152:TziCEgBRW2m7P2m9V0yO3xoNhEQfWNpp9ZM2wdXywZ12ufVKkAIbZnADTFV41b6M:TuCdm7PL9GyO3xwhEGWjXjju12OVYIVk
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
Processes:
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops file in System32 directory 4 IoCs
Processes:
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exedescription ioc Process File opened for modification C:\Windows\System32\GroupPolicy 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exepid Process 2520 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exedescription pid Process procid_target PID 2520 wrote to memory of 2776 2520 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe 31 PID 2520 wrote to memory of 2776 2520 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe 31 PID 2520 wrote to memory of 2776 2520 642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe"C:\Users\Admin\AppData\Local\Temp\642b2c1febb5c0e7ba9afeb45b66b9baa7b02d0b24f8b8a3477e3bfdeffa5d6f.exe"1⤵
- Modifies firewall policy service
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2520 -s 2322⤵PID:2776
-