Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 05:04
Static task
static1
Behavioral task
behavioral1
Sample
a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe
Resource
win7-20220812-en
General
-
Target
a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe
-
Size
1.4MB
-
MD5
250c1b6bcc5fe9b36a485d0debe048a0
-
SHA1
5ba0c24a3e61c66793e594be30ba4c2ac9401641
-
SHA256
a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8
-
SHA512
640711b94b0e7cb6f10fa30f6062e9f90a34bc732ab45ec3a3fb40d1a9dac3e31709121b2a2585f979e0c43ea93c17b1c89826539a0877882a323628dedc1dcb
-
SSDEEP
24576:RNmF/mnBoDM5f7F2RdcclPqVX7TwBTGQOD6N+FrFtTp3I1gRUfbVx5rLIhkp8TR/:RYVZo5TcRB1oNp4v7L81/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ms.exepid process 5092 ms.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 4004 takeown.exe 2540 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
icacls.exetakeown.exepid process 2540 icacls.exe 4004 takeown.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
Processes:
a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exedescription ioc process File opened for modification C:\WINDOWS\Bef.tmp a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe File opened for modification C:\Windows\yre.tmp a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exepid process 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
takeown.exedescription pid process Token: SeTakeOwnershipPrivilege 4004 takeown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ms.exepid process 5092 ms.exe 5092 ms.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exems.exedescription pid process target process PID 3312 wrote to memory of 5092 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe ms.exe PID 3312 wrote to memory of 5092 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe ms.exe PID 3312 wrote to memory of 5092 3312 a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe ms.exe PID 5092 wrote to memory of 4004 5092 ms.exe takeown.exe PID 5092 wrote to memory of 4004 5092 ms.exe takeown.exe PID 5092 wrote to memory of 2540 5092 ms.exe icacls.exe PID 5092 wrote to memory of 2540 5092 ms.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe"C:\Users\Admin\AppData\Local\Temp\a6d42ce9c848da1be899cdc96a33c7378d3b6563f616ac4e6c32b5cb1e5ccfe8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\ms.exeC:\Users\Admin\AppData\Local\Temp\ms.exe k2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SYSTEM32\takeown.exetakeown /f "C:\WINDOWS\system32\Sens.dll"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\SYSTEM32\icacls.exeicacls "C:\WINDOWS\system32\Sens.dll" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5a37f6986bc775c44618b3809c558234a
SHA1725ff87dd8c8a45e03dc184545d0867c273284fa
SHA256057da3046d0a3c08b7c3da9422b1a983d3f46a4d4a6739f3c2d1e1e1cd2c8e85
SHA512d1dc31e73eff083799bfb28cd429f8365ee128ddc71ef9bd7f80b01de1b5d8088038fcfc04e2d131d6e6e0252721b5a5ac23e33bf659f8756d401b1021581ccc
-
Filesize
424KB
MD5a37f6986bc775c44618b3809c558234a
SHA1725ff87dd8c8a45e03dc184545d0867c273284fa
SHA256057da3046d0a3c08b7c3da9422b1a983d3f46a4d4a6739f3c2d1e1e1cd2c8e85
SHA512d1dc31e73eff083799bfb28cd429f8365ee128ddc71ef9bd7f80b01de1b5d8088038fcfc04e2d131d6e6e0252721b5a5ac23e33bf659f8756d401b1021581ccc