Analysis

  • max time kernel
    135s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    05-05-2021 03:09

General

  • Target

    NFgODbNY.exe

  • Size

    6.6MB

  • MD5

    5f6a74e286c98bbe45a6a667026813bc

  • SHA1

    5d17945ebbb46e1f73ce15a8a110e0e1b6c165da

  • SHA256

    863853bdbdb6ed3d644305d866286c1fa25255e62851f3d7bee5f3e2bcefaa98

  • SHA512

    0f1f2e000dc7f0f7fff435fba887c19a9698e7004bea64baddafd17d96e4bbe1266f6ce9a27296d220ef7a6b17fab65e787e01e6a1e2aff4ea0fa1d58f84a701

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NFgODbNY.exe
    "C:\Users\Admin\AppData\Local\Temp\NFgODbNY.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Users\Admin\AppData\Local\Temp\NFgODbNY.exe
      "C:\Users\Admin\AppData\Local\Temp\NFgODbNY.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2052
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3744
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:544
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:416
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3352
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:2784
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1848
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1848 -s 2020
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3848

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1848-205-0x000001F875EC6000-0x000001F875EC8000-memory.dmp

        Filesize

        8KB

      • memory/1848-190-0x000001F877F20000-0x000001F877F21000-memory.dmp

        Filesize

        4KB

      • memory/1848-185-0x000001F875D50000-0x000001F875D51000-memory.dmp

        Filesize

        4KB

      • memory/1848-192-0x000001F875EC0000-0x000001F875EC2000-memory.dmp

        Filesize

        8KB

      • memory/1848-193-0x000001F875EC3000-0x000001F875EC5000-memory.dmp

        Filesize

        8KB

      • memory/1900-170-0x0000000002360000-0x0000000002375000-memory.dmp

        Filesize

        84KB

      • memory/1900-131-0x0000000002280000-0x0000000002335000-memory.dmp

        Filesize

        724KB

      • memory/1900-153-0x0000000000650000-0x0000000000660000-memory.dmp

        Filesize

        64KB

      • memory/1900-166-0x0000000002350000-0x0000000002360000-memory.dmp

        Filesize

        64KB

      • memory/1900-142-0x00000000005C0000-0x000000000063C000-memory.dmp

        Filesize

        496KB

      • memory/1900-127-0x00000000005B1000-0x00000000005B6000-memory.dmp

        Filesize

        20KB