Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 18:21
Behavioral task
behavioral1
Sample
1qwss.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1qwss.exe
Resource
win10v2004-20240802-en
General
-
Target
1qwss.exe
-
Size
37KB
-
MD5
7ba0e5137bfa7ff37035b9d64087f1d3
-
SHA1
301a5a8ca0507f7cbd32f67e5669dbf7862cc7a4
-
SHA256
2ad4531950ae5d29c411ca5cfa092b36eb5cfee82695a08e984b2a5379d57fec
-
SHA512
6aaf22c7c86ae93a7e73387180dbc68a5acf55c5bd1504afc41ac93e996f20c1e47370b0d16471359d429d28f0baddb02c599c31a8260ad9794d459320895be6
-
SSDEEP
768:LQkki91twjrlSheFCLIrM+rMRa8Nu4pt:LQkki91Ojwhe0LT+gRJNj
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2900 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1qwss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe Token: 33 852 1qwss.exe Token: SeIncBasePriorityPrivilege 852 1qwss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 852 wrote to memory of 2900 852 1qwss.exe 88 PID 852 wrote to memory of 2900 852 1qwss.exe 88 PID 852 wrote to memory of 2900 852 1qwss.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1qwss.exe"C:\Users\Admin\AppData\Local\Temp\1qwss.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\1qwss.exe" "1qwss.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2900
-