Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 06:20
Behavioral task
behavioral1
Sample
Server1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Server1.exe
Resource
win10v2004-20241007-en
General
-
Target
Server1.exe
-
Size
93KB
-
MD5
71b3810a22e1b51e8b88cd63b5e23ba0
-
SHA1
7ac4ab80301dcabcc97ec68093ed775d148946de
-
SHA256
57bf3ab110dc44c56ed5a53b02b8c9ccc24054cf9c9a5aacc72f71a992138a3f
-
SHA512
85ddc05305902ed668981b2c33bab16f8e5a5d9db9ff1cee4d4a06c917075e7d59776bebfb3a3128ec4432db63f07c593af6f4907a5b75c9027f1bc9538612e8
-
SSDEEP
1536:PUNJD/HBZbszKu9AZpE7r1jEwzGi1dDWDtgS:PUUzK4AZCHCi1dA6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1864 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2148 Server1.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe Token: 33 2148 Server1.exe Token: SeIncBasePriorityPrivilege 2148 Server1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1864 2148 Server1.exe 30 PID 2148 wrote to memory of 1864 2148 Server1.exe 30 PID 2148 wrote to memory of 1864 2148 Server1.exe 30 PID 2148 wrote to memory of 1864 2148 Server1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server1.exe"C:\Users\Admin\AppData\Local\Temp\Server1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server1.exe" "Server1.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1864
-