Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 16:38
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20241007-en
General
-
Target
Server.exe
-
Size
37KB
-
MD5
3eb33ffef04410659b43ebdf8a82711b
-
SHA1
a6142e6fd6bf75daef95c68d74a5c49ec3d5eb92
-
SHA256
db8447da65e2e525179aadf32fdec52d0abe739cdeb41c6958cd2d3fcb396a44
-
SHA512
8860ce6078ba0c2f88dd69056ead885a55034a092679a3eba8b10d95c6a9b1af84b5d57751608a1e90166aac25a7bacad98ad87c43545514cf069fac26818666
-
SSDEEP
384:gS+6WIiejtCVLO309Qmykrt4QdqMjf+vWEWxrAF+rMRTyN/0L+EcoinblneHQM3m:KHdGdkrOGb+eE2rM+rMRa8Nuist
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3440 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe Token: 33 852 Server.exe Token: SeIncBasePriorityPrivilege 852 Server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 852 wrote to memory of 3440 852 Server.exe 91 PID 852 wrote to memory of 3440 852 Server.exe 91 PID 852 wrote to memory of 3440 852 Server.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3440
-