Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2024, 12:59 UTC

General

  • Target

    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe

  • Size

    93KB

  • MD5

    620c27afe41049cc4ab6f328f6e5a710

  • SHA1

    cc30fb8c1754565ff5f549337a6bd6bd63a02d31

  • SHA256

    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317

  • SHA512

    2f1893b66cbf1e98362ae2cb7f840934cf8e3bac4d83644340d133eb6f0ca4f5cc19bbc9633271b560db7cd4210b1941758a04d0f1225f121c1ff78480888ba6

  • SSDEEP

    768:WY3YUnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3OsGe:aUxOx6baIa9RZj00ljEwzGi1dDqDQgS

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
    "C:\Users\Admin\AppData\Local\Temp\647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe" "647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2400

Network

    No results found
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
  • 127.0.0.1:5552
    647bdfb48420bf1ee4f293e245e8b00e31c5ab8381d4e608547e60aa90cee317N.exe
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-0-0x00000000740C1000-0x00000000740C2000-memory.dmp

    Filesize

    4KB

  • memory/1928-1-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-2-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-4-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.