Analysis

  • max time kernel
    132s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    18-05-2021 08:00

General

  • Target

    02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe

  • Size

    6.6MB

  • MD5

    2b1e39fc33f9264f8401f6b59bb0857f

  • SHA1

    2553c5666fa5cc37dfc68f35dadc5f026d22bc6b

  • SHA256

    02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14

  • SHA512

    1750fd743d8a132f6769b418789be6f84b26e9f4b13569d1afa48660ee64885f7bf8b95bb14d87c892e1b39a8bfe8bde7bd0d8ad6eeaefd00bb1a82a3fce17fa

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe
    "C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe
      "C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2160
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3836
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:1856
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4012
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2868
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:2980
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3728
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 3728 -s 1940
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1576-131-0x0000000002880000-0x0000000002935000-memory.dmp

        Filesize

        724KB

      • memory/1576-174-0x00000000031E0000-0x00000000031F5000-memory.dmp

        Filesize

        84KB

      • memory/1576-170-0x00000000029E0000-0x00000000029F0000-memory.dmp

        Filesize

        64KB

      • memory/1576-143-0x0000000002940000-0x00000000029BC000-memory.dmp

        Filesize

        496KB

      • memory/1576-156-0x00000000009E0000-0x00000000009F0000-memory.dmp

        Filesize

        64KB

      • memory/1576-127-0x00000000008A1000-0x00000000008A6000-memory.dmp

        Filesize

        20KB

      • memory/3728-190-0x00000292C9600000-0x00000292C9602000-memory.dmp

        Filesize

        8KB

      • memory/3728-189-0x00000292C95B0000-0x00000292C95B1000-memory.dmp

        Filesize

        4KB

      • memory/3728-191-0x00000292C9603000-0x00000292C9605000-memory.dmp

        Filesize

        8KB

      • memory/3728-196-0x00000292E3880000-0x00000292E3881000-memory.dmp

        Filesize

        4KB

      • memory/3728-209-0x00000292C9606000-0x00000292C9608000-memory.dmp

        Filesize

        8KB