Analysis

  • max time kernel
    41s
  • max time network
    62s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    15-05-2021 14:55

General

  • Target

    d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe

  • Size

    6.6MB

  • MD5

    25369980e676f0d0ec7c800e81542eb7

  • SHA1

    d7872bf7ea33888f20d501990b3000745c9201da

  • SHA256

    d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6

  • SHA512

    07ea34b613f61da1868696e3b070825e6176403f5f33b21cc29f37d7fa28e0509c635048cf7c826bc8ee0815f6b22d1a391b664990c40b867813095796b3f06b

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe
    "C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe
      "C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3420
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2308
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2424
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:2160
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2272
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3832
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:1048
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4028
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 4028 -s 2024
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3188

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2340-172-0x00000000033C0000-0x00000000033D5000-memory.dmp

        Filesize

        84KB

      • memory/2340-155-0x0000000001030000-0x0000000001040000-memory.dmp

        Filesize

        64KB

      • memory/2340-144-0x0000000001150000-0x00000000011CC000-memory.dmp

        Filesize

        496KB

      • memory/2340-168-0x00000000033B0000-0x00000000033C0000-memory.dmp

        Filesize

        64KB

      • memory/2340-127-0x0000000001011000-0x0000000001016000-memory.dmp

        Filesize

        20KB

      • memory/2340-131-0x00000000032F0000-0x00000000033A5000-memory.dmp

        Filesize

        724KB

      • memory/4028-186-0x000001DD70460000-0x000001DD70461000-memory.dmp

        Filesize

        4KB

      • memory/4028-190-0x000001DD710E0000-0x000001DD710E1000-memory.dmp

        Filesize

        4KB

      • memory/4028-193-0x000001DD6FFB3000-0x000001DD6FFB5000-memory.dmp

        Filesize

        8KB

      • memory/4028-192-0x000001DD6FFB0000-0x000001DD6FFB2000-memory.dmp

        Filesize

        8KB

      • memory/4028-205-0x000001DD6FFB6000-0x000001DD6FFB8000-memory.dmp

        Filesize

        8KB