Analysis
-
max time kernel
118s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 21:34
Behavioral task
behavioral1
Sample
c713265c4ef0841bb39d1a64efe21750N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c713265c4ef0841bb39d1a64efe21750N.exe
Resource
win10v2004-20240802-en
General
-
Target
c713265c4ef0841bb39d1a64efe21750N.exe
-
Size
93KB
-
MD5
c713265c4ef0841bb39d1a64efe21750
-
SHA1
a3fd5ad5a2d73e70178b9d606cca0c9c0a1cbe57
-
SHA256
287b7475b355d2296246714d85dbab3b6aea8700834912c5242df06e2a6a5caf
-
SHA512
3cdd65a96135ba4461de68c81659d3bf8ae12538df27894e7507e589dcc28a672928633697c2fa56e897e3970b12ee87e26b9a88cc03d58f4f1147701660ae69
-
SSDEEP
768:4Y33upDIO/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3IsGq:3uuOx6baIa9RPj00ljEwzGi1dDAD0gS
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2920 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c713265c4ef0841bb39d1a64efe21750N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 c713265c4ef0841bb39d1a64efe21750N.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: 33 2752 c713265c4ef0841bb39d1a64efe21750N.exe Token: SeIncBasePriorityPrivilege 2752 c713265c4ef0841bb39d1a64efe21750N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2920 2752 c713265c4ef0841bb39d1a64efe21750N.exe 88 PID 2752 wrote to memory of 2920 2752 c713265c4ef0841bb39d1a64efe21750N.exe 88 PID 2752 wrote to memory of 2920 2752 c713265c4ef0841bb39d1a64efe21750N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c713265c4ef0841bb39d1a64efe21750N.exe"C:\Users\Admin\AppData\Local\Temp\c713265c4ef0841bb39d1a64efe21750N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\c713265c4ef0841bb39d1a64efe21750N.exe" "c713265c4ef0841bb39d1a64efe21750N.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2920
-