Analysis

  • max time kernel
    18s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-04-2021 09:35

General

  • Target

    e3a3ce745bced26cd26d5d219e75dfb281738e2545ffc45cc91d19da9d21c73d.exe

  • Size

    6.6MB

  • MD5

    5a59ce4c687a7f855f1079dc98f71170

  • SHA1

    3198daca631983b3301c3ce88961ee7bbcafc222

  • SHA256

    e3a3ce745bced26cd26d5d219e75dfb281738e2545ffc45cc91d19da9d21c73d

  • SHA512

    bddc8f9143a060be9517dfe8cf863c37f0ad05900a1a4daef5ee86473701f56997f34949aeb003533ad823f892afd4f0cfeef4f8dfdc3de31a0d9d0ffab09e25

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3a3ce745bced26cd26d5d219e75dfb281738e2545ffc45cc91d19da9d21c73d.exe
    "C:\Users\Admin\AppData\Local\Temp\e3a3ce745bced26cd26d5d219e75dfb281738e2545ffc45cc91d19da9d21c73d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\e3a3ce745bced26cd26d5d219e75dfb281738e2545ffc45cc91d19da9d21c73d.exe
      "C:\Users\Admin\AppData\Local\Temp\e3a3ce745bced26cd26d5d219e75dfb281738e2545ffc45cc91d19da9d21c73d.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3084
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4376
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1004
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:4444
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4404
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:4460
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:808
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 808 -s 1932
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1752

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/808-71-0x000001B6FA536000-0x000001B6FA538000-memory.dmp

        Filesize

        8KB

      • memory/808-69-0x000001B6FA533000-0x000001B6FA535000-memory.dmp

        Filesize

        8KB

      • memory/808-66-0x000001B6FC770000-0x000001B6FC771000-memory.dmp

        Filesize

        4KB

      • memory/808-65-0x00007FF862DF0000-0x00007FF8637DC000-memory.dmp

        Filesize

        9.9MB

      • memory/808-68-0x000001B6FA530000-0x000001B6FA532000-memory.dmp

        Filesize

        8KB

      • memory/808-67-0x000001B6FCC90000-0x000001B6FCC91000-memory.dmp

        Filesize

        4KB

      • memory/1752-72-0x000002962A6F0000-0x000002962A6F1000-memory.dmp

        Filesize

        4KB

      • memory/1752-73-0x000002962A6F0000-0x000002962A6F1000-memory.dmp

        Filesize

        4KB

      • memory/5104-19-0x0000000003071000-0x00000000030E3000-memory.dmp

        Filesize

        456KB

      • memory/5104-15-0x00000000029B1000-0x00000000029B6000-memory.dmp

        Filesize

        20KB