Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-04-2021 17:41

General

  • Target

    28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe

  • Size

    6.6MB

  • MD5

    611b27f49da01bbd6b68be24774924ec

  • SHA1

    1e30a84b6e107f87750c996f3353e9d13ae27c62

  • SHA256

    28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951

  • SHA512

    ddb08d2b4f0ba7394469321cad4a4f11fd530e17346850808c780812af6494ecac0ecc1522d771230f27573e01c2b35009926f8c4e201ad51d03c7e783dde11f

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe
    "C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe
      "C:\Users\Admin\AppData\Local\Temp\28c1ae412c6434eb0407d7333cc281dabc1d461d4bbb0f9e709780cd37400951.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3084
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3520
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2696
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3208
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:612
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1032
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:2524
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2592
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2592 -s 1984
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:212

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/212-72-0x000002A0023D0000-0x000002A0023D1000-memory.dmp

        Filesize

        4KB

      • memory/2592-71-0x000001851D216000-0x000001851D218000-memory.dmp

        Filesize

        8KB

      • memory/2592-69-0x000001851FE10000-0x000001851FE11000-memory.dmp

        Filesize

        4KB

      • memory/2592-68-0x000001851D213000-0x000001851D215000-memory.dmp

        Filesize

        8KB

      • memory/2592-67-0x000001851D210000-0x000001851D212000-memory.dmp

        Filesize

        8KB

      • memory/2592-65-0x00007FFC486E0000-0x00007FFC490CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2592-66-0x000001851D1C0000-0x000001851D1C1000-memory.dmp

        Filesize

        4KB

      • memory/3084-15-0x0000000000D01000-0x0000000000D06000-memory.dmp

        Filesize

        20KB

      • memory/3084-30-0x0000000002EC1000-0x0000000002F16000-memory.dmp

        Filesize

        340KB