Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2025, 12:17 UTC

General

  • Target

    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe

  • Size

    37KB

  • MD5

    4a350b83a4b50ad1026c730a2d6f8c7d

  • SHA1

    257b390f25e5143a81f88c74507f4a33770e01ed

  • SHA256

    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70

  • SHA512

    1d6638d439fc25e0137601fdc175efe030f2db496659b5147bcc7a20e13c63cbc524739aa96d2183f6e79d222f871ebdc795cb848987dc3f0b9661e54629c92c

  • SSDEEP

    384:JaqBkiyjnDNGRn5IyUvapIrPbh+/VsIt6crAF+rMRTyN/0L+EcoinblneHQM3epO:Y35M5jUvairANsIQcrM+rMRa8NujMt

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    "C:\Users\Admin\AppData\Local\Temp\c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe" "c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:3064

Network

    No results found
  • 176.110.208.212:25565
    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    152 B
    3
  • 176.110.208.212:25565
    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    152 B
    3
  • 176.110.208.212:25565
    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    152 B
    3
  • 176.110.208.212:25565
    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    152 B
    3
  • 176.110.208.212:25565
    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    152 B
    3
  • 176.110.208.212:25565
    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    152 B
    3
  • 176.110.208.212:25565
    c25c4e81b574c7d2472ad00714852eb757116af3e6e88d6c7010b9ffc8a06b70.exe
    52 B
    1
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2556-0-0x0000000074DE1000-0x0000000074DE2000-memory.dmp

    Filesize

    4KB

  • memory/2556-1-0x0000000074DE0000-0x000000007538B000-memory.dmp

    Filesize

    5.7MB

  • memory/2556-2-0x0000000074DE0000-0x000000007538B000-memory.dmp

    Filesize

    5.7MB

  • memory/2556-4-0x0000000074DE0000-0x000000007538B000-memory.dmp

    Filesize

    5.7MB

  • memory/2556-5-0x0000000074DE0000-0x000000007538B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.