Analysis

  • max time kernel
    18s
  • max time network
    106s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-04-2021 09:33

General

  • Target

    bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25.exe

  • Size

    6.6MB

  • MD5

    399f290d4092909f40188d037c75001e

  • SHA1

    f2db04769b8227882aaca73a1f49e1afc3b0b14f

  • SHA256

    bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25

  • SHA512

    a8c7e0d4eb15f60b6bc749d3dcf6b4bddb2abf932d039786e006dd66f1199ca3a32a16fa933bc195015da84f98f6a716cedd89b41932eee68a548a0e29acead0

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25.exe
    "C:\Users\Admin\AppData\Local\Temp\bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25.exe
      "C:\Users\Admin\AppData\Local\Temp\bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3552
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:904
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4020
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:3708
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3800
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2372
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:684
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:492
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 492 -s 1940
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3808

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/492-65-0x00007FFE1FC20000-0x00007FFE2060C000-memory.dmp

        Filesize

        9.9MB

      • memory/492-71-0x000001EC25DC6000-0x000001EC25DC8000-memory.dmp

        Filesize

        8KB

      • memory/492-69-0x000001EC28AA0000-0x000001EC28AA1000-memory.dmp

        Filesize

        4KB

      • memory/492-68-0x000001EC288F0000-0x000001EC288F1000-memory.dmp

        Filesize

        4KB

      • memory/492-67-0x000001EC25DC3000-0x000001EC25DC5000-memory.dmp

        Filesize

        8KB

      • memory/492-66-0x000001EC25DC0000-0x000001EC25DC2000-memory.dmp

        Filesize

        8KB

      • memory/3552-19-0x00000000034F1000-0x0000000003563000-memory.dmp

        Filesize

        456KB

      • memory/3552-15-0x0000000001491000-0x0000000001496000-memory.dmp

        Filesize

        20KB

      • memory/3808-72-0x000001484D700000-0x000001484D701000-memory.dmp

        Filesize

        4KB