Analysis
-
max time kernel
76s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe
Resource
win7-20220812-en
General
-
Target
4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe
-
Size
1.4MB
-
MD5
41567638ed986e800ede778a0d121b30
-
SHA1
9cc68d2a46eace0644ccb9b42ed1ba22ed7f4a77
-
SHA256
4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b
-
SHA512
90c94a7ff68482833dbe3e6707f76c4ae0aafd2f97ef8736f3a2f1240672dcfebe0de7ed542d2cc08a9fbaf30a693d350802f5b34960979b889f48ecd7e8eea0
-
SSDEEP
24576:rNmF/mnBoDM5f7F2hQHhToIzdF9s8kwWcMXixJH9GSG+VLUx3GHE07p:rYVZo5TchQBvj9tWXaJHkMLhkSp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 ms.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 696 takeown.exe 396 icacls.exe -
Loads dropped DLL 1 IoCs
pid Process 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 696 takeown.exe 396 icacls.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\Bef.tmp 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe File opened for modification C:\Windows\yre.tmp 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 696 takeown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 ms.exe 1960 ms.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1960 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 30 PID 1956 wrote to memory of 1960 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 30 PID 1956 wrote to memory of 1960 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 30 PID 1956 wrote to memory of 1960 1956 4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe 30 PID 1960 wrote to memory of 696 1960 ms.exe 31 PID 1960 wrote to memory of 696 1960 ms.exe 31 PID 1960 wrote to memory of 696 1960 ms.exe 31 PID 1960 wrote to memory of 696 1960 ms.exe 31 PID 1960 wrote to memory of 396 1960 ms.exe 33 PID 1960 wrote to memory of 396 1960 ms.exe 33 PID 1960 wrote to memory of 396 1960 ms.exe 33 PID 1960 wrote to memory of 396 1960 ms.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe"C:\Users\Admin\AppData\Local\Temp\4500f8d91c1e1e888064d93818db065eb5189c0d9bb8640acd5a0639059d4d9b.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\ms.exeC:\Users\Admin\AppData\Local\Temp\ms.exe k2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\takeown.exetakeown /f "C:\WINDOWS\system32\Sens.dll"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\system32\icacls.exeicacls "C:\WINDOWS\system32\Sens.dll" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:396
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5224ee144eb388979711b9c37411418c4
SHA14537031b414f1ce14182076996d72aaf710710be
SHA256d51dfedf88f777136ce1fcbba8c82e11440cf91d1baa278727f708d5c90f1253
SHA512cecc6f7ab9a61db2fdd5c6d1df2b24920f960968ff7318d4fa5da5d20bbdab023a5d8a8f5ca5f19f87d48cb15c4fb373dde0fef724f0b2fca208954894c3780d
-
Filesize
424KB
MD5224ee144eb388979711b9c37411418c4
SHA14537031b414f1ce14182076996d72aaf710710be
SHA256d51dfedf88f777136ce1fcbba8c82e11440cf91d1baa278727f708d5c90f1253
SHA512cecc6f7ab9a61db2fdd5c6d1df2b24920f960968ff7318d4fa5da5d20bbdab023a5d8a8f5ca5f19f87d48cb15c4fb373dde0fef724f0b2fca208954894c3780d
-
Filesize
424KB
MD5224ee144eb388979711b9c37411418c4
SHA14537031b414f1ce14182076996d72aaf710710be
SHA256d51dfedf88f777136ce1fcbba8c82e11440cf91d1baa278727f708d5c90f1253
SHA512cecc6f7ab9a61db2fdd5c6d1df2b24920f960968ff7318d4fa5da5d20bbdab023a5d8a8f5ca5f19f87d48cb15c4fb373dde0fef724f0b2fca208954894c3780d