Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-04-2021 09:28
Static task
static1
Behavioral task
behavioral1
Sample
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
-
Size
6.6MB
-
MD5
0909225de438e0b387a0b184e6fcc852
-
SHA1
1befc5ea0bd95ded2a66c13ceb80a440c69fa039
-
SHA256
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4
-
SHA512
b8bc019e408250d2a3dc8142c93bfc63f17f914ec5feda55b9079c81ef17023667462d140c40903db73abbe4be4e1d43cfa9659caf9da350f8bf85807571b0f3
Score
9/10
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Loads dropped DLL 29 IoCs
pid Process 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3052 2600 WerFault.exe 88 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2600 powershell.exe 2600 powershell.exe 2600 powershell.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1112 WMIC.exe Token: SeSecurityPrivilege 1112 WMIC.exe Token: SeTakeOwnershipPrivilege 1112 WMIC.exe Token: SeLoadDriverPrivilege 1112 WMIC.exe Token: SeSystemProfilePrivilege 1112 WMIC.exe Token: SeSystemtimePrivilege 1112 WMIC.exe Token: SeProfSingleProcessPrivilege 1112 WMIC.exe Token: SeIncBasePriorityPrivilege 1112 WMIC.exe Token: SeCreatePagefilePrivilege 1112 WMIC.exe Token: SeBackupPrivilege 1112 WMIC.exe Token: SeRestorePrivilege 1112 WMIC.exe Token: SeShutdownPrivilege 1112 WMIC.exe Token: SeDebugPrivilege 1112 WMIC.exe Token: SeSystemEnvironmentPrivilege 1112 WMIC.exe Token: SeRemoteShutdownPrivilege 1112 WMIC.exe Token: SeUndockPrivilege 1112 WMIC.exe Token: SeManageVolumePrivilege 1112 WMIC.exe Token: 33 1112 WMIC.exe Token: 34 1112 WMIC.exe Token: 35 1112 WMIC.exe Token: 36 1112 WMIC.exe Token: SeIncreaseQuotaPrivilege 1112 WMIC.exe Token: SeSecurityPrivilege 1112 WMIC.exe Token: SeTakeOwnershipPrivilege 1112 WMIC.exe Token: SeLoadDriverPrivilege 1112 WMIC.exe Token: SeSystemProfilePrivilege 1112 WMIC.exe Token: SeSystemtimePrivilege 1112 WMIC.exe Token: SeProfSingleProcessPrivilege 1112 WMIC.exe Token: SeIncBasePriorityPrivilege 1112 WMIC.exe Token: SeCreatePagefilePrivilege 1112 WMIC.exe Token: SeBackupPrivilege 1112 WMIC.exe Token: SeRestorePrivilege 1112 WMIC.exe Token: SeShutdownPrivilege 1112 WMIC.exe Token: SeDebugPrivilege 1112 WMIC.exe Token: SeSystemEnvironmentPrivilege 1112 WMIC.exe Token: SeRemoteShutdownPrivilege 1112 WMIC.exe Token: SeUndockPrivilege 1112 WMIC.exe Token: SeManageVolumePrivilege 1112 WMIC.exe Token: 33 1112 WMIC.exe Token: 34 1112 WMIC.exe Token: 35 1112 WMIC.exe Token: 36 1112 WMIC.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 3052 WerFault.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3996 wrote to memory of 1780 3996 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 75 PID 3996 wrote to memory of 1780 3996 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 75 PID 3996 wrote to memory of 1780 3996 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 75 PID 1780 wrote to memory of 3980 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 77 PID 1780 wrote to memory of 3980 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 77 PID 1780 wrote to memory of 3980 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 77 PID 3980 wrote to memory of 1112 3980 cmd.exe 78 PID 3980 wrote to memory of 1112 3980 cmd.exe 78 PID 3980 wrote to memory of 1112 3980 cmd.exe 78 PID 1780 wrote to memory of 1784 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 81 PID 1780 wrote to memory of 1784 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 81 PID 1780 wrote to memory of 1784 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 81 PID 1784 wrote to memory of 1928 1784 cmd.exe 82 PID 1784 wrote to memory of 1928 1784 cmd.exe 82 PID 1784 wrote to memory of 1928 1784 cmd.exe 82 PID 1928 wrote to memory of 2032 1928 net.exe 83 PID 1928 wrote to memory of 2032 1928 net.exe 83 PID 1928 wrote to memory of 2032 1928 net.exe 83 PID 1780 wrote to memory of 2716 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 84 PID 1780 wrote to memory of 2716 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 84 PID 1780 wrote to memory of 2716 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 84 PID 2716 wrote to memory of 2736 2716 cmd.exe 85 PID 2716 wrote to memory of 2736 2716 cmd.exe 85 PID 2716 wrote to memory of 2736 2716 cmd.exe 85 PID 2736 wrote to memory of 3396 2736 net.exe 86 PID 2736 wrote to memory of 3396 2736 net.exe 86 PID 2736 wrote to memory of 3396 2736 net.exe 86 PID 1780 wrote to memory of 2600 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 88 PID 1780 wrote to memory of 2600 1780 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c wmic ntdomain get domainname3⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ntdomain get domainname4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:2032
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net group "domain admins" /domain3⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net.exenet group "domain admins" /domain4⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group "domain admins" /domain5⤵PID:3396
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2600 -s 19564⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
-