Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-04-2021 17:41
Static task
static1
Behavioral task
behavioral1
Sample
28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe
Resource
win10v20201028
General
-
Target
28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe
-
Size
6.6MB
-
MD5
611b27f49da01bbd6b68be24774924ec
-
SHA1
1e30a84b6e107f87750c996f3353e9d13ae27c62
-
SHA256
28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951
-
SHA512
ddb08d2b4f0ba7394469321cad4a4f11fd530e17346850808c780812af6494ecac0ecc1522d771230f27573e01c2b35009926f8c4e201ad51d03c7e783dde11f
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Loads dropped DLL 20 IoCs
pid Process 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 900 ipconfig.exe 1528 ipconfig.exe 1680 netstat.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software WScript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft WScript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host WScript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1520 powershell.exe 1520 powershell.exe 1520 powershell.exe 1520 powershell.exe 1520 powershell.exe 1520 powershell.exe 1520 powershell.exe 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1636 WMIC.exe Token: SeSecurityPrivilege 1636 WMIC.exe Token: SeTakeOwnershipPrivilege 1636 WMIC.exe Token: SeLoadDriverPrivilege 1636 WMIC.exe Token: SeSystemProfilePrivilege 1636 WMIC.exe Token: SeSystemtimePrivilege 1636 WMIC.exe Token: SeProfSingleProcessPrivilege 1636 WMIC.exe Token: SeIncBasePriorityPrivilege 1636 WMIC.exe Token: SeCreatePagefilePrivilege 1636 WMIC.exe Token: SeBackupPrivilege 1636 WMIC.exe Token: SeRestorePrivilege 1636 WMIC.exe Token: SeShutdownPrivilege 1636 WMIC.exe Token: SeDebugPrivilege 1636 WMIC.exe Token: SeSystemEnvironmentPrivilege 1636 WMIC.exe Token: SeRemoteShutdownPrivilege 1636 WMIC.exe Token: SeUndockPrivilege 1636 WMIC.exe Token: SeManageVolumePrivilege 1636 WMIC.exe Token: 33 1636 WMIC.exe Token: 34 1636 WMIC.exe Token: 35 1636 WMIC.exe Token: SeIncreaseQuotaPrivilege 1636 WMIC.exe Token: SeSecurityPrivilege 1636 WMIC.exe Token: SeTakeOwnershipPrivilege 1636 WMIC.exe Token: SeLoadDriverPrivilege 1636 WMIC.exe Token: SeSystemProfilePrivilege 1636 WMIC.exe Token: SeSystemtimePrivilege 1636 WMIC.exe Token: SeProfSingleProcessPrivilege 1636 WMIC.exe Token: SeIncBasePriorityPrivilege 1636 WMIC.exe Token: SeCreatePagefilePrivilege 1636 WMIC.exe Token: SeBackupPrivilege 1636 WMIC.exe Token: SeRestorePrivilege 1636 WMIC.exe Token: SeShutdownPrivilege 1636 WMIC.exe Token: SeDebugPrivilege 1636 WMIC.exe Token: SeSystemEnvironmentPrivilege 1636 WMIC.exe Token: SeRemoteShutdownPrivilege 1636 WMIC.exe Token: SeUndockPrivilege 1636 WMIC.exe Token: SeManageVolumePrivilege 1636 WMIC.exe Token: 33 1636 WMIC.exe Token: 34 1636 WMIC.exe Token: 35 1636 WMIC.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 1680 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2004 1828 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 27 PID 1828 wrote to memory of 2004 1828 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 27 PID 1828 wrote to memory of 2004 1828 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 27 PID 1828 wrote to memory of 2004 1828 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 27 PID 2004 wrote to memory of 1484 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 31 PID 2004 wrote to memory of 1484 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 31 PID 2004 wrote to memory of 1484 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 31 PID 2004 wrote to memory of 1484 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 31 PID 1484 wrote to memory of 1636 1484 cmd.exe 32 PID 1484 wrote to memory of 1636 1484 cmd.exe 32 PID 1484 wrote to memory of 1636 1484 cmd.exe 32 PID 1484 wrote to memory of 1636 1484 cmd.exe 32 PID 2004 wrote to memory of 928 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 34 PID 2004 wrote to memory of 928 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 34 PID 2004 wrote to memory of 928 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 34 PID 2004 wrote to memory of 928 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 34 PID 928 wrote to memory of 1900 928 cmd.exe 35 PID 928 wrote to memory of 1900 928 cmd.exe 35 PID 928 wrote to memory of 1900 928 cmd.exe 35 PID 928 wrote to memory of 1900 928 cmd.exe 35 PID 1900 wrote to memory of 1276 1900 net.exe 36 PID 1900 wrote to memory of 1276 1900 net.exe 36 PID 1900 wrote to memory of 1276 1900 net.exe 36 PID 1900 wrote to memory of 1276 1900 net.exe 36 PID 2004 wrote to memory of 1792 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 37 PID 2004 wrote to memory of 1792 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 37 PID 2004 wrote to memory of 1792 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 37 PID 2004 wrote to memory of 1792 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 37 PID 1792 wrote to memory of 2032 1792 cmd.exe 38 PID 1792 wrote to memory of 2032 1792 cmd.exe 38 PID 1792 wrote to memory of 2032 1792 cmd.exe 38 PID 1792 wrote to memory of 2032 1792 cmd.exe 38 PID 2032 wrote to memory of 108 2032 net.exe 39 PID 2032 wrote to memory of 108 2032 net.exe 39 PID 2032 wrote to memory of 108 2032 net.exe 39 PID 2032 wrote to memory of 108 2032 net.exe 39 PID 2004 wrote to memory of 1520 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 40 PID 2004 wrote to memory of 1520 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 40 PID 2004 wrote to memory of 1520 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 40 PID 2004 wrote to memory of 1520 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 40 PID 2004 wrote to memory of 1896 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 41 PID 2004 wrote to memory of 1896 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 41 PID 2004 wrote to memory of 1896 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 41 PID 2004 wrote to memory of 1896 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 41 PID 1896 wrote to memory of 900 1896 cmd.exe 42 PID 1896 wrote to memory of 900 1896 cmd.exe 42 PID 1896 wrote to memory of 900 1896 cmd.exe 42 PID 1896 wrote to memory of 900 1896 cmd.exe 42 PID 2004 wrote to memory of 1528 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 43 PID 2004 wrote to memory of 1528 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 43 PID 2004 wrote to memory of 1528 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 43 PID 2004 wrote to memory of 1528 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 43 PID 2004 wrote to memory of 1680 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 44 PID 2004 wrote to memory of 1680 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 44 PID 2004 wrote to memory of 1680 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 44 PID 2004 wrote to memory of 1680 2004 28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe 44 PID 2028 wrote to memory of 840 2028 hoiBPMUR.exe 46 PID 2028 wrote to memory of 840 2028 hoiBPMUR.exe 46 PID 2028 wrote to memory of 840 2028 hoiBPMUR.exe 46 PID 2028 wrote to memory of 840 2028 hoiBPMUR.exe 46 PID 840 wrote to memory of 2260 840 cmd.exe 48 PID 840 wrote to memory of 2260 840 cmd.exe 48 PID 840 wrote to memory of 2260 840 cmd.exe 48 PID 840 wrote to memory of 2260 840 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe"C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe"C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c wmic ntdomain get domainname3⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ntdomain get domainname4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:1276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net group "domain admins" /domain3⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\net.exenet group "domain admins" /domain4⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group "domain admins" /domain5⤵PID:108
-
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:900
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:1528
-
-
C:\Windows\SysWOW64\netstat.exenetstat -na3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Windows\hoiBPMUR.exeC:\Windows\hoiBPMUR.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c call "c:\windows\temp\tmp.vbs"2⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"3⤵
- Modifies data under HKEY_USERS
PID:2260
-
-
-
C:\Windows\cRrFNjUU.exeC:\Windows\cRrFNjUU.exe1⤵PID:2296