Analysis

  • max time kernel
    118s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 17:09

General

  • Target

    82dd7120179e4f21a657fe122bf92bc15b85bf6af7f3d23dde9b6e707b62cc27.exe

  • Size

    95KB

  • MD5

    baefc3ceebbe9393ca7f02b1a0b91fb1

  • SHA1

    1747da62e3600f510987f9e77ab2658d0b0ae9c7

  • SHA256

    82dd7120179e4f21a657fe122bf92bc15b85bf6af7f3d23dde9b6e707b62cc27

  • SHA512

    e38c0e8deb1b6b1d6d7f3f8ed0b1b16cd2a4ef15482d5bd3e6676c963435cd545674107460c2aaeb3f35e45b8b9df005b09c77818aa28ac9c8b1e7673b4c160c

  • SSDEEP

    1536:pOhb6Oi9wchHbUlkiwV9MIRKj7MeIYRpttWa4YyMJ//usFvpf3CQtm:pcchHbUyxPKj7MeI6TyMEKRXm

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82dd7120179e4f21a657fe122bf92bc15b85bf6af7f3d23dde9b6e707b62cc27.exe
    "C:\Users\Admin\AppData\Local\Temp\82dd7120179e4f21a657fe122bf92bc15b85bf6af7f3d23dde9b6e707b62cc27.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Windows\SYSTEM32\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\82dd7120179e4f21a657fe122bf92bc15b85bf6af7f3d23dde9b6e707b62cc27.exe" "82dd7120179e4f21a657fe122bf92bc15b85bf6af7f3d23dde9b6e707b62cc27.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:4236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3148-0-0x00007FF9A4C43000-0x00007FF9A4C45000-memory.dmp

    Filesize

    8KB

  • memory/3148-1-0x0000000000890000-0x00000000008AE000-memory.dmp

    Filesize

    120KB

  • memory/3148-2-0x0000000002900000-0x000000000290C000-memory.dmp

    Filesize

    48KB

  • memory/3148-3-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/3148-4-0x00007FF9A4C40000-0x00007FF9A5701000-memory.dmp

    Filesize

    10.8MB

  • memory/3148-5-0x0000000002930000-0x0000000002938000-memory.dmp

    Filesize

    32KB

  • memory/3148-6-0x0000000002950000-0x000000000295E000-memory.dmp

    Filesize

    56KB

  • memory/3148-7-0x00007FF9A4C43000-0x00007FF9A4C45000-memory.dmp

    Filesize

    8KB

  • memory/3148-8-0x00007FF9A4C40000-0x00007FF9A5701000-memory.dmp

    Filesize

    10.8MB