Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 01:03
Static task
static1
Behavioral task
behavioral1
Sample
7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe
Resource
win7-20220812-en
General
-
Target
7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe
-
Size
72KB
-
MD5
0189d11fef56258412711436079fb236
-
SHA1
a5e047bab2a836a7fbde9bc74712caa91fddee65
-
SHA256
7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f
-
SHA512
10653dd1c044541e9cb985459556c61d39ae45ad597d398ea02ede4418c11887a5de0fd71fd5f3b714c252a72e7006b3cccc98e523e7362fd60ca082cb70d2b6
-
SSDEEP
768:YkLyxhrNQ7/pkcJLXyzAEtSfPpf+drcAC8hhMOuSf+2ME9kv4FMLIWV2gXw:YyyF9MXUAasoQ8h2Zhak4SIWV2qw
Malware Config
Signatures
-
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 600 takeown.exe 1196 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 600 takeown.exe 1196 icacls.exe -
Drops file in System32 directory 2 IoCs
Processes:
7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exedescription ioc process File created C:\Windows\SysWOW64\skjc.exe 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe File opened for modification C:\Windows\SysWOW64\skjc.exe 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exepid process 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exedescription pid process target process PID 1148 wrote to memory of 600 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe takeown.exe PID 1148 wrote to memory of 600 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe takeown.exe PID 1148 wrote to memory of 600 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe takeown.exe PID 1148 wrote to memory of 600 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe takeown.exe PID 1148 wrote to memory of 1196 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe icacls.exe PID 1148 wrote to memory of 1196 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe icacls.exe PID 1148 wrote to memory of 1196 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe icacls.exe PID 1148 wrote to memory of 1196 1148 7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe"C:\Users\Admin\AppData\Local\Temp\7f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /f "C:\Windows\system32\skjc.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe "C:\Windows\system32\skjc.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\skjc.exeFilesize
72KB
MD50189d11fef56258412711436079fb236
SHA1a5e047bab2a836a7fbde9bc74712caa91fddee65
SHA2567f4a62d4627207505489a7b33bc6bc067cb55a55f883d54a337dbd3bde5bcf4f
SHA51210653dd1c044541e9cb985459556c61d39ae45ad597d398ea02ede4418c11887a5de0fd71fd5f3b714c252a72e7006b3cccc98e523e7362fd60ca082cb70d2b6
-
memory/600-57-0x0000000000000000-mapping.dmp
-
memory/1148-56-0x0000000074C11000-0x0000000074C13000-memory.dmpFilesize
8KB
-
memory/1196-59-0x0000000000000000-mapping.dmp