Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 23:00
Behavioral task
behavioral1
Sample
networkintegrityservice.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
networkintegrityservice.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NetworkIntegrityService.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
NetworkIntegrityService.pyc
Resource
win10v2004-20241007-en
General
-
Target
NetworkIntegrityService.pyc
-
Size
115KB
-
MD5
0f9df87a3974b23b6528171dc64bef0a
-
SHA1
d4c21f431d285f5f4e900afc885d4925b3b77a1f
-
SHA256
4680011cd6f9861b9fb90744d1ea42c9eb5ab98d785129f95b1e2be500f8fd36
-
SHA512
6057eb97a972264de2b3fae7581076ecc47802409242cee3d1fdbd68fd06558f97f1bcc367fa22f604fff95364f0e2456368ea96bf06529ec35addda106c68b6
-
SSDEEP
3072:6r7iN7cGBMv5ObSQNtdhq0C52M7ps/2MQ+oK8hv7hp:6PiN7cJOG5dpS2R+G3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2904 2544 cmd.exe 31 PID 2544 wrote to memory of 2904 2544 cmd.exe 31 PID 2544 wrote to memory of 2904 2544 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NetworkIntegrityService.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\NetworkIntegrityService.pyc2⤵
- Modifies registry class
PID:2904
-