Analysis

  • max time kernel
    46s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 11:22

General

  • Target

    2626cd04569038478f4bc5d2669c5a1aece142d17a807fc5be8344f51c9a2000.exe

  • Size

    548KB

  • MD5

    168b217c270dcb252bdc3d5ad075b7be

  • SHA1

    b7e51f26d272a2c3b0c5eccbe8146b11f4def0bc

  • SHA256

    2626cd04569038478f4bc5d2669c5a1aece142d17a807fc5be8344f51c9a2000

  • SHA512

    2509af32202d95e79b724cea73fedb3942fe0690c90598e0d5f51c4cca71dd664b461b01df2abc6c14344b3c68cbb971c3742eccbb51f72d3cd1d098aab10130

  • SSDEEP

    6144:K2681WUqicX91Ch5ygR0CiKGgITLkuxY1Sc8lMjN7C7Zc7zaFnjY:KlTicX9MkgR0CtG6ZBjNm14zai

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2626cd04569038478f4bc5d2669c5a1aece142d17a807fc5be8344f51c9a2000.exe
    "C:\Users\Admin\AppData\Local\Temp\2626cd04569038478f4bc5d2669c5a1aece142d17a807fc5be8344f51c9a2000.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Windows\SysWOW64\net.exe
      net user administrator 811630187
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 user administrator 811630187
        3⤵
          PID:1908
      • C:\Windows\SysWOW64\net.exe
        net user ÒªÃÜÂë¼Ó1308722504 811630187 /add
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user ÒªÃÜÂë¼Ó1308722504 811630187 /add
          3⤵
            PID:816
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators ÒªÃÜÂë¼Ó1308722504 /add
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2000
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators ÒªÃÜÂë¼Ó1308722504 /add
            3⤵
              PID:1632
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0
          1⤵
            PID:684
          • C:\Windows\system32\csrss.exe
            %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
            1⤵
            • Enumerates system info in registry
            • Suspicious use of WriteProcessMemory
            PID:1904
          • C:\Windows\system32\winlogon.exe
            winlogon.exe
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:1936
            • C:\Windows\system32\LogonUI.exe
              "LogonUI.exe" /flags:0x0
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:988

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/668-54-0x0000000075981000-0x0000000075983000-memory.dmp

            Filesize

            8KB

          • memory/684-62-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp

            Filesize

            8KB

          • memory/816-58-0x0000000000000000-mapping.dmp

          • memory/988-63-0x0000000000000000-mapping.dmp

          • memory/988-64-0x000007FEFB151000-0x000007FEFB153000-memory.dmp

            Filesize

            8KB

          • memory/1080-57-0x0000000000000000-mapping.dmp

          • memory/1632-61-0x0000000000000000-mapping.dmp

          • memory/1772-55-0x0000000000000000-mapping.dmp

          • memory/1908-56-0x0000000000000000-mapping.dmp

          • memory/2000-60-0x0000000000000000-mapping.dmp