Analysis
-
max time kernel
91s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2023 08:03
Static task
static1
Behavioral task
behavioral1
Sample
StoreRunMe.cmd
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
General
-
Target
StoreRunMe.cmd
-
Size
1KB
-
MD5
1073d04178d921c04a2171776b537aaf
-
SHA1
e0a975f937579d4d81cdbbf959e6acf656c0d833
-
SHA256
fd7c4ebb6017b208f8a4930ad63979e3c38ac56ec6da96ca373cc778e9832e24
-
SHA512
5676897097f6ca4867cff3c1ba4b4565654d46d4fe11f6603a983b0d6996fe9013a158dabbb95ae11610a7addff6cf310be95e31fda9d4c5c6b52449b520da99
Malware Config
Signatures
-
Possible privilege escalation attempt 5 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2964 takeown.exe 648 icacls.exe 3308 icacls.exe 4620 icacls.exe 888 icacls.exe -
Modifies file permissions 1 TTPs 5 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2964 takeown.exe 648 icacls.exe 3308 icacls.exe 4620 icacls.exe 888 icacls.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid process 1584 regedit.exe 5028 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4036 powershell.exe 4036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
takeown.exepowershell.exedescription pid process Token: SeTakeOwnershipPrivilege 2964 takeown.exe Token: SeDebugPrivilege 4036 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 488 wrote to memory of 5040 488 cmd.exe net.exe PID 488 wrote to memory of 5040 488 cmd.exe net.exe PID 5040 wrote to memory of 4348 5040 net.exe net1.exe PID 5040 wrote to memory of 4348 5040 net.exe net1.exe PID 488 wrote to memory of 5028 488 cmd.exe regedit.exe PID 488 wrote to memory of 5028 488 cmd.exe regedit.exe PID 488 wrote to memory of 1584 488 cmd.exe regedit.exe PID 488 wrote to memory of 1584 488 cmd.exe regedit.exe PID 488 wrote to memory of 2964 488 cmd.exe takeown.exe PID 488 wrote to memory of 2964 488 cmd.exe takeown.exe PID 488 wrote to memory of 648 488 cmd.exe icacls.exe PID 488 wrote to memory of 648 488 cmd.exe icacls.exe PID 488 wrote to memory of 2168 488 cmd.exe xcopy.exe PID 488 wrote to memory of 2168 488 cmd.exe xcopy.exe PID 488 wrote to memory of 4036 488 cmd.exe powershell.exe PID 488 wrote to memory of 4036 488 cmd.exe powershell.exe PID 488 wrote to memory of 3308 488 cmd.exe icacls.exe PID 488 wrote to memory of 3308 488 cmd.exe icacls.exe PID 488 wrote to memory of 4620 488 cmd.exe icacls.exe PID 488 wrote to memory of 4620 488 cmd.exe icacls.exe PID 488 wrote to memory of 888 488 cmd.exe icacls.exe PID 488 wrote to memory of 888 488 cmd.exe icacls.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\StoreRunMe.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\system32\net.exeNET SESSION2⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 SESSION3⤵PID:4348
-
C:\Windows\regedit.exeregedit.exe /S Files\regedit1.reg2⤵
- Runs .reg file with regedit
PID:5028 -
C:\Windows\regedit.exeregedit.exe /S Files\regedit2.regS2⤵
- Runs .reg file with regedit
PID:1584 -
C:\Windows\system32\takeown.exetakeown /F "C:\Program Files\WindowsApps"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "Everyone":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:648 -
C:\Windows\system32\xcopy.exexcopy Files\store_depends_from_enterprise "C:\Program Files\WindowsApps\" /e /i /h /y /k /o /x2⤵PID:2168
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "& "".\Files\StoreDependencies.ps1"""2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "ALL APPLICATION PACKAGES":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3308 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "NT SERVICE\TrustedInstaller":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4620 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant "System":F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:888