Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 06:30
Static task
static1
Behavioral task
behavioral1
Sample
d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe
Resource
win7-20220901-en
General
-
Target
d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe
-
Size
1.4MB
-
MD5
1601b40ecb0d3c4b436166db2e483390
-
SHA1
62fe53dd32faabce546574de5e5d18607ac7c880
-
SHA256
d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02
-
SHA512
4129961ef053bbce0b628fcf47075ee0a8cd969190d88e03c2faf155e8d9c7446f7055c7e4ad5af2e5778a5616cb778a159f508dd906b78eef0ca89d5d475da6
-
SSDEEP
24576:gNmF/mnBoDM5f7F2/3ghdtdCczlEh7ThXBz2wB/MSe2Tp3I1gRUfbVx5rLIhkp8l:gYVZo5Tc/3g1XGh7VRz51ne0p4v7L81n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ms.exepid process 4932 ms.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 676 takeown.exe 4276 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 676 takeown.exe 4276 icacls.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
Processes:
d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exedescription ioc process File opened for modification C:\WINDOWS\Bef.tmp d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe File opened for modification C:\Windows\yre.tmp d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exepid process 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
takeown.exedescription pid process Token: SeTakeOwnershipPrivilege 676 takeown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ms.exepid process 4932 ms.exe 4932 ms.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exems.exedescription pid process target process PID 3076 wrote to memory of 4932 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe ms.exe PID 3076 wrote to memory of 4932 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe ms.exe PID 3076 wrote to memory of 4932 3076 d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe ms.exe PID 4932 wrote to memory of 676 4932 ms.exe takeown.exe PID 4932 wrote to memory of 676 4932 ms.exe takeown.exe PID 4932 wrote to memory of 4276 4932 ms.exe icacls.exe PID 4932 wrote to memory of 4276 4932 ms.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe"C:\Users\Admin\AppData\Local\Temp\d1fb1feaf9c6a5866e11d1a459e8431285f6a93c49efebc9e0936c313926ae02.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\ms.exeC:\Users\Admin\AppData\Local\Temp\ms.exe k2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SYSTEM32\takeown.exetakeown /f "C:\WINDOWS\system32\Sens.dll"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\SYSTEM32\icacls.exeicacls "C:\WINDOWS\system32\Sens.dll" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5a37f6986bc775c44618b3809c558234a
SHA1725ff87dd8c8a45e03dc184545d0867c273284fa
SHA256057da3046d0a3c08b7c3da9422b1a983d3f46a4d4a6739f3c2d1e1e1cd2c8e85
SHA512d1dc31e73eff083799bfb28cd429f8365ee128ddc71ef9bd7f80b01de1b5d8088038fcfc04e2d131d6e6e0252721b5a5ac23e33bf659f8756d401b1021581ccc
-
Filesize
424KB
MD5a37f6986bc775c44618b3809c558234a
SHA1725ff87dd8c8a45e03dc184545d0867c273284fa
SHA256057da3046d0a3c08b7c3da9422b1a983d3f46a4d4a6739f3c2d1e1e1cd2c8e85
SHA512d1dc31e73eff083799bfb28cd429f8365ee128ddc71ef9bd7f80b01de1b5d8088038fcfc04e2d131d6e6e0252721b5a5ac23e33bf659f8756d401b1021581ccc