Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-01-2023 08:03
Static task
static1
Behavioral task
behavioral1
Sample
StoreRunMe.cmd
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
General
-
Target
StoreRunMe.cmd
-
Size
1KB
-
MD5
1073d04178d921c04a2171776b537aaf
-
SHA1
e0a975f937579d4d81cdbbf959e6acf656c0d833
-
SHA256
fd7c4ebb6017b208f8a4930ad63979e3c38ac56ec6da96ca373cc778e9832e24
-
SHA512
5676897097f6ca4867cff3c1ba4b4565654d46d4fe11f6603a983b0d6996fe9013a158dabbb95ae11610a7addff6cf310be95e31fda9d4c5c6b52449b520da99
Malware Config
Signatures
-
Possible privilege escalation attempt 5 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 832 takeown.exe 1452 icacls.exe 620 icacls.exe 440 icacls.exe 1548 icacls.exe -
Modifies file permissions 1 TTPs 5 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exetakeown.exepid process 1452 icacls.exe 620 icacls.exe 440 icacls.exe 1548 icacls.exe 832 takeown.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid process 1396 regedit.exe 1108 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1764 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
takeown.exepowershell.exedescription pid process Token: SeTakeOwnershipPrivilege 832 takeown.exe Token: SeDebugPrivilege 1764 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 1972 wrote to memory of 2032 1972 cmd.exe net.exe PID 1972 wrote to memory of 2032 1972 cmd.exe net.exe PID 1972 wrote to memory of 2032 1972 cmd.exe net.exe PID 2032 wrote to memory of 1560 2032 net.exe net1.exe PID 2032 wrote to memory of 1560 2032 net.exe net1.exe PID 2032 wrote to memory of 1560 2032 net.exe net1.exe PID 1972 wrote to memory of 1396 1972 cmd.exe regedit.exe PID 1972 wrote to memory of 1396 1972 cmd.exe regedit.exe PID 1972 wrote to memory of 1396 1972 cmd.exe regedit.exe PID 1972 wrote to memory of 1108 1972 cmd.exe regedit.exe PID 1972 wrote to memory of 1108 1972 cmd.exe regedit.exe PID 1972 wrote to memory of 1108 1972 cmd.exe regedit.exe PID 1972 wrote to memory of 832 1972 cmd.exe takeown.exe PID 1972 wrote to memory of 832 1972 cmd.exe takeown.exe PID 1972 wrote to memory of 832 1972 cmd.exe takeown.exe PID 1972 wrote to memory of 1452 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 1452 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 1452 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 2044 1972 cmd.exe xcopy.exe PID 1972 wrote to memory of 2044 1972 cmd.exe xcopy.exe PID 1972 wrote to memory of 2044 1972 cmd.exe xcopy.exe PID 1972 wrote to memory of 1764 1972 cmd.exe powershell.exe PID 1972 wrote to memory of 1764 1972 cmd.exe powershell.exe PID 1972 wrote to memory of 1764 1972 cmd.exe powershell.exe PID 1972 wrote to memory of 620 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 620 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 620 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 440 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 440 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 440 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 1548 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 1548 1972 cmd.exe icacls.exe PID 1972 wrote to memory of 1548 1972 cmd.exe icacls.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\StoreRunMe.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\net.exeNET SESSION2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\regedit.exeregedit.exe /S Files\regedit1.reg2⤵
- Runs .reg file with regedit
PID:1396 -
C:\Windows\regedit.exeregedit.exe /S Files\regedit2.regS2⤵
- Runs .reg file with regedit
PID:1108 -
C:\Windows\system32\takeown.exetakeown /F "C:\Program Files\WindowsApps"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "Everyone":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1452 -
C:\Windows\system32\xcopy.exexcopy Files\store_depends_from_enterprise "C:\Program Files\WindowsApps\" /e /i /h /y /k /o /x2⤵PID:2044
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "& "".\Files\StoreDependencies.ps1"""2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "ALL APPLICATION PACKAGES":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:620 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "NT SERVICE\TrustedInstaller":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:440 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "System":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1548
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 SESSION1⤵PID:1560