Analysis
-
max time kernel
88s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 07:32
Static task
static1
Behavioral task
behavioral1
Sample
9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe
Resource
win7-20221111-en
windows7-x64
5 signatures
150 seconds
General
-
Target
9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe
-
Size
40KB
-
MD5
1fc4f7c736f8b793657c5c9f368cfdd0
-
SHA1
bc39639ad5c168d324e0a097310e554e911c6fc6
-
SHA256
9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851
-
SHA512
c73bd079ac5104c0596f2f5e5fda0851a79288beb8e2b6d795451a1dfb935ab797b6c1068bf41a6eab097dd9d1c90b0a1c61ff77c9f738b1c15b8bb591243ba2
-
SSDEEP
768:/+3ruMn9xB/9ZaY5z0YtI6je50Gg0I3wqgNchNk:/+3zLBX/5FI6je50Gg0Ifg2zk
Malware Config
Signatures
-
Possible privilege escalation attempt 8 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exepid process 1660 icacls.exe 584 takeown.exe 1448 icacls.exe 1408 takeown.exe 1496 icacls.exe 1712 takeown.exe 1156 icacls.exe 1064 takeown.exe -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid process 584 takeown.exe 1448 icacls.exe 1408 takeown.exe 1496 icacls.exe 1712 takeown.exe 1156 icacls.exe 1064 takeown.exe 1660 icacls.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 1712 takeown.exe Token: SeTakeOwnershipPrivilege 584 takeown.exe Token: SeTakeOwnershipPrivilege 1064 takeown.exe Token: SeTakeOwnershipPrivilege 1408 takeown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exepid process 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exedescription pid process target process PID 624 wrote to memory of 1712 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1712 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1712 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1712 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1156 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1156 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1156 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1156 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1064 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1064 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1064 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1064 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1660 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1660 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1660 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1660 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 584 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 584 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 584 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 584 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1448 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1448 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1448 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1448 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1408 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1408 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1408 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1408 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe takeown.exe PID 624 wrote to memory of 1496 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1496 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1496 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe PID 624 wrote to memory of 1496 624 9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe"C:\Users\Admin\AppData\Local\Temp\9111164d4687ab96e7a9cb79ee9620a825403827531e3f045fe9728d08759851.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\SysWOW64\icacls.exeC:\Windows\System32\icacls.exe "C:\Windows\System32\cmd.exe" /grant Users:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1156 -
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Windows\SysWOW64\icacls.exeC:\Windows\System32\icacls.exe "C:\Windows\System32\ftp.exe" /grant Users:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1660 -
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:584 -
C:\Windows\SysWOW64\icacls.exeC:\Windows\System32\icacls.exe "C:\Windows\System32\wscript.exe" /grant Users:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1448 -
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Windows\SysWOW64\icacls.exeC:\Windows\System32\icacls.exe "C:\Windows\System32\cscript.exe" /grant Users:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1496