Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 08:19
Behavioral task
behavioral1
Sample
54.exe
Resource
win10v2004-20250314-en
General
-
Target
54.exe
-
Size
37KB
-
MD5
24da20d341d8876b6346e9d32078f670
-
SHA1
3c34aa2d297f4d70007c08e3097af9fbba71b1e0
-
SHA256
32442d2c9761778c83e858ad1c526b1e43d7a6525151088c5ec790ef693dc250
-
SHA512
b75ca39c36a4a9342ad46b46248c23f955f21e2f20e3609705a98342b20d336aa9e0ab56891538ff4b5c139053e89b022f2b310f717f9c720b3ca8f55a217614
-
SSDEEP
384:s6U+yw7BeAaXaEiVbzdmB0O4yUvNixgp+Z2v/RYJ/oM6IxrAF+rMRTyN/0L+EcoO:tryw79POTUvNZYv64rM+rMRa8Nu9+Yt
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3068 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe Token: 33 3380 54.exe Token: SeIncBasePriorityPrivilege 3380 54.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3068 3380 54.exe 95 PID 3380 wrote to memory of 3068 3380 54.exe 95 PID 3380 wrote to memory of 3068 3380 54.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\54.exe"C:\Users\Admin\AppData\Local\Temp\54.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\54.exe" "54.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3068
-