Analysis
-
max time kernel
41s -
max time network
62s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-05-2021 14:55
Static task
static1
Behavioral task
behavioral1
Sample
d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe
-
Size
6.6MB
-
MD5
25369980e676f0d0ec7c800e81542eb7
-
SHA1
d7872bf7ea33888f20d501990b3000745c9201da
-
SHA256
d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6
-
SHA512
07ea34b613f61da1868696e3b070825e6176403f5f33b21cc29f37d7fa28e0509c635048cf7c826bc8ee0815f6b22d1a391b664990c40b867813095796b3f06b
Score
9/10
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Loads dropped DLL 29 IoCs
pid Process 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3188 4028 WerFault.exe 87 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4028 powershell.exe 4028 powershell.exe 4028 powershell.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2308 WMIC.exe Token: SeSecurityPrivilege 2308 WMIC.exe Token: SeTakeOwnershipPrivilege 2308 WMIC.exe Token: SeLoadDriverPrivilege 2308 WMIC.exe Token: SeSystemProfilePrivilege 2308 WMIC.exe Token: SeSystemtimePrivilege 2308 WMIC.exe Token: SeProfSingleProcessPrivilege 2308 WMIC.exe Token: SeIncBasePriorityPrivilege 2308 WMIC.exe Token: SeCreatePagefilePrivilege 2308 WMIC.exe Token: SeBackupPrivilege 2308 WMIC.exe Token: SeRestorePrivilege 2308 WMIC.exe Token: SeShutdownPrivilege 2308 WMIC.exe Token: SeDebugPrivilege 2308 WMIC.exe Token: SeSystemEnvironmentPrivilege 2308 WMIC.exe Token: SeRemoteShutdownPrivilege 2308 WMIC.exe Token: SeUndockPrivilege 2308 WMIC.exe Token: SeManageVolumePrivilege 2308 WMIC.exe Token: 33 2308 WMIC.exe Token: 34 2308 WMIC.exe Token: 35 2308 WMIC.exe Token: 36 2308 WMIC.exe Token: SeIncreaseQuotaPrivilege 2308 WMIC.exe Token: SeSecurityPrivilege 2308 WMIC.exe Token: SeTakeOwnershipPrivilege 2308 WMIC.exe Token: SeLoadDriverPrivilege 2308 WMIC.exe Token: SeSystemProfilePrivilege 2308 WMIC.exe Token: SeSystemtimePrivilege 2308 WMIC.exe Token: SeProfSingleProcessPrivilege 2308 WMIC.exe Token: SeIncBasePriorityPrivilege 2308 WMIC.exe Token: SeCreatePagefilePrivilege 2308 WMIC.exe Token: SeBackupPrivilege 2308 WMIC.exe Token: SeRestorePrivilege 2308 WMIC.exe Token: SeShutdownPrivilege 2308 WMIC.exe Token: SeDebugPrivilege 2308 WMIC.exe Token: SeSystemEnvironmentPrivilege 2308 WMIC.exe Token: SeRemoteShutdownPrivilege 2308 WMIC.exe Token: SeUndockPrivilege 2308 WMIC.exe Token: SeManageVolumePrivilege 2308 WMIC.exe Token: 33 2308 WMIC.exe Token: 34 2308 WMIC.exe Token: 35 2308 WMIC.exe Token: 36 2308 WMIC.exe Token: SeDebugPrivilege 4028 powershell.exe Token: SeDebugPrivilege 3188 WerFault.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 856 wrote to memory of 2340 856 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 72 PID 856 wrote to memory of 2340 856 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 72 PID 856 wrote to memory of 2340 856 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 72 PID 2340 wrote to memory of 3420 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 76 PID 2340 wrote to memory of 3420 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 76 PID 2340 wrote to memory of 3420 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 76 PID 3420 wrote to memory of 2308 3420 cmd.exe 77 PID 3420 wrote to memory of 2308 3420 cmd.exe 77 PID 3420 wrote to memory of 2308 3420 cmd.exe 77 PID 2340 wrote to memory of 2056 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 81 PID 2340 wrote to memory of 2056 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 81 PID 2340 wrote to memory of 2056 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 81 PID 2056 wrote to memory of 2424 2056 cmd.exe 82 PID 2056 wrote to memory of 2424 2056 cmd.exe 82 PID 2056 wrote to memory of 2424 2056 cmd.exe 82 PID 2424 wrote to memory of 2160 2424 net.exe 83 PID 2424 wrote to memory of 2160 2424 net.exe 83 PID 2424 wrote to memory of 2160 2424 net.exe 83 PID 2340 wrote to memory of 2272 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 84 PID 2340 wrote to memory of 2272 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 84 PID 2340 wrote to memory of 2272 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 84 PID 2272 wrote to memory of 3832 2272 cmd.exe 85 PID 2272 wrote to memory of 3832 2272 cmd.exe 85 PID 2272 wrote to memory of 3832 2272 cmd.exe 85 PID 3832 wrote to memory of 1048 3832 net.exe 86 PID 3832 wrote to memory of 1048 3832 net.exe 86 PID 3832 wrote to memory of 1048 3832 net.exe 86 PID 2340 wrote to memory of 4028 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 87 PID 2340 wrote to memory of 4028 2340 d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe"C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe"C:\Users\Admin\AppData\Local\Temp\d5d659c147e9ef6a75b7312c9d6b2d5c86145d66c25796ecdc0787aa48d32cb6.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c wmic ntdomain get domainname3⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ntdomain get domainname4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:2160
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net group "domain admins" /domain3⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net.exenet group "domain admins" /domain4⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group "domain admins" /domain5⤵PID:1048
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4028 -s 20244⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
-