Analysis

  • max time kernel
    132s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-04-2021 09:28

General

  • Target

    5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe

  • Size

    6.6MB

  • MD5

    0909225de438e0b387a0b184e6fcc852

  • SHA1

    1befc5ea0bd95ded2a66c13ceb80a440c69fa039

  • SHA256

    5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4

  • SHA512

    b8bc019e408250d2a3dc8142c93bfc63f17f914ec5feda55b9079c81ef17023667462d140c40903db73abbe4be4e1d43cfa9659caf9da350f8bf85807571b0f3

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
    "C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
      "C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1112
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:3396
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2600
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2600 -s 1956
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3052

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1780-19-0x0000000002CD1000-0x0000000002D43000-memory.dmp

        Filesize

        456KB

      • memory/1780-29-0x00000000033D1000-0x0000000003426000-memory.dmp

        Filesize

        340KB

      • memory/1780-15-0x0000000002B41000-0x0000000002B46000-memory.dmp

        Filesize

        20KB

      • memory/2600-68-0x0000028A4C440000-0x0000028A4C441000-memory.dmp

        Filesize

        4KB

      • memory/2600-64-0x00007FFC34760000-0x00007FFC3514C000-memory.dmp

        Filesize

        9.9MB

      • memory/2600-65-0x0000028A4A280000-0x0000028A4A281000-memory.dmp

        Filesize

        4KB

      • memory/2600-66-0x0000028A4A2E0000-0x0000028A4A2E2000-memory.dmp

        Filesize

        8KB

      • memory/2600-67-0x0000028A4A2E3000-0x0000028A4A2E5000-memory.dmp

        Filesize

        8KB

      • memory/2600-70-0x0000028A4A2E6000-0x0000028A4A2E8000-memory.dmp

        Filesize

        8KB

      • memory/3052-71-0x0000022D690D0000-0x0000022D690D1000-memory.dmp

        Filesize

        4KB