Analysis
-
max time kernel
28s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 09:23
Static task
static1
Behavioral task
behavioral1
Sample
Exotic.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Exotic.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Exotic.exe
-
Size
7.3MB
-
MD5
5677e0d59fea82ee3429ce9c4e8134a4
-
SHA1
80e74985ff0e651a9cd18298614fa0994cb6c183
-
SHA256
0f0ec79102ad1d811ab4f978214b43703aa8542f3815629b830c5aa520de5ad7
-
SHA512
5e649c4886fedb75f1f4d5751fafc78557669c6a0d885ff2ff8dce530ef3dd19059d809c3ca284b25773de01fc83fc4009ef38c394eec0d2db2165a737679341
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Exotic.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Exotic.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Exotic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 956 wmic.exe Token: SeSecurityPrivilege 956 wmic.exe Token: SeTakeOwnershipPrivilege 956 wmic.exe Token: SeLoadDriverPrivilege 956 wmic.exe Token: SeSystemProfilePrivilege 956 wmic.exe Token: SeSystemtimePrivilege 956 wmic.exe Token: SeProfSingleProcessPrivilege 956 wmic.exe Token: SeIncBasePriorityPrivilege 956 wmic.exe Token: SeCreatePagefilePrivilege 956 wmic.exe Token: SeBackupPrivilege 956 wmic.exe Token: SeRestorePrivilege 956 wmic.exe Token: SeShutdownPrivilege 956 wmic.exe Token: SeDebugPrivilege 956 wmic.exe Token: SeSystemEnvironmentPrivilege 956 wmic.exe Token: SeRemoteShutdownPrivilege 956 wmic.exe Token: SeUndockPrivilege 956 wmic.exe Token: SeManageVolumePrivilege 956 wmic.exe Token: 33 956 wmic.exe Token: 34 956 wmic.exe Token: 35 956 wmic.exe Token: SeIncreaseQuotaPrivilege 956 wmic.exe Token: SeSecurityPrivilege 956 wmic.exe Token: SeTakeOwnershipPrivilege 956 wmic.exe Token: SeLoadDriverPrivilege 956 wmic.exe Token: SeSystemProfilePrivilege 956 wmic.exe Token: SeSystemtimePrivilege 956 wmic.exe Token: SeProfSingleProcessPrivilege 956 wmic.exe Token: SeIncBasePriorityPrivilege 956 wmic.exe Token: SeCreatePagefilePrivilege 956 wmic.exe Token: SeBackupPrivilege 956 wmic.exe Token: SeRestorePrivilege 956 wmic.exe Token: SeShutdownPrivilege 956 wmic.exe Token: SeDebugPrivilege 956 wmic.exe Token: SeSystemEnvironmentPrivilege 956 wmic.exe Token: SeRemoteShutdownPrivilege 956 wmic.exe Token: SeUndockPrivilege 956 wmic.exe Token: SeManageVolumePrivilege 956 wmic.exe Token: 33 956 wmic.exe Token: 34 956 wmic.exe Token: 35 956 wmic.exe Token: SeIncreaseQuotaPrivilege 2028 wmic.exe Token: SeSecurityPrivilege 2028 wmic.exe Token: SeTakeOwnershipPrivilege 2028 wmic.exe Token: SeLoadDriverPrivilege 2028 wmic.exe Token: SeSystemProfilePrivilege 2028 wmic.exe Token: SeSystemtimePrivilege 2028 wmic.exe Token: SeProfSingleProcessPrivilege 2028 wmic.exe Token: SeIncBasePriorityPrivilege 2028 wmic.exe Token: SeCreatePagefilePrivilege 2028 wmic.exe Token: SeBackupPrivilege 2028 wmic.exe Token: SeRestorePrivilege 2028 wmic.exe Token: SeShutdownPrivilege 2028 wmic.exe Token: SeDebugPrivilege 2028 wmic.exe Token: SeSystemEnvironmentPrivilege 2028 wmic.exe Token: SeRemoteShutdownPrivilege 2028 wmic.exe Token: SeUndockPrivilege 2028 wmic.exe Token: SeManageVolumePrivilege 2028 wmic.exe Token: 33 2028 wmic.exe Token: 34 2028 wmic.exe Token: 35 2028 wmic.exe Token: SeIncreaseQuotaPrivilege 2028 wmic.exe Token: SeSecurityPrivilege 2028 wmic.exe Token: SeTakeOwnershipPrivilege 2028 wmic.exe Token: SeLoadDriverPrivilege 2028 wmic.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Exotic.exedescription pid process target process PID 1888 wrote to memory of 1828 1888 Exotic.exe hostname.exe PID 1888 wrote to memory of 1828 1888 Exotic.exe hostname.exe PID 1888 wrote to memory of 1828 1888 Exotic.exe hostname.exe PID 1888 wrote to memory of 956 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 956 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 956 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 2028 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 2028 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 2028 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 1564 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 1564 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 1564 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 1140 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 1140 1888 Exotic.exe wmic.exe PID 1888 wrote to memory of 1140 1888 Exotic.exe wmic.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Exotic.exe"C:\Users\Admin\AppData\Local\Temp\Exotic.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\hostname.exehostname2⤵PID:1828
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\System32\Wbem\wmic.exewmic ComputerSystem get TotalPhysicalMemory2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\System32\Wbem\wmic.exewmic logicaldisk where Caption="C:" get Size2⤵PID:1564
-
-
C:\Windows\System32\Wbem\wmic.exewmic cpu get NumberOfCores2⤵PID:1140
-