Analysis

  • max time kernel
    19s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 16:59

General

  • Target

    c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe

  • Size

    134KB

  • MD5

    cf174472200c2c0205782d352735b594

  • SHA1

    1e462e8c90aaec05f6dfbb3d91e5b8e5fd610517

  • SHA256

    c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9

  • SHA512

    3293c8eb7d5515e100c17febebab81065f474d82b314e1cdc0e65d3a4aea789ecf412ca0807e5a2ba518593697bfe1547553133696c8c7c1a21662a31a4be3c8

  • SSDEEP

    3072:kV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPLipC+r:Jt5hBPi0BW69hd1MMdxPe9N9uA069TBc

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 20 IoCs
  • Modifies file permissions 1 TTPs 20 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe
    "C:\Users\Admin\AppData\Local\Temp\c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3535.tmp\3536.tmp\3537.bat C:\Users\Admin\AppData\Local\Temp\c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:280
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\ntoskrnl.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\ntoskrnl.exe" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:844
      • C:\Windows\system32\takeown.exe
        takeown -r -f -skipsl "C:\Windows\Boot"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1708
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\Boot" /t /c /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:872
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\bfsvc.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\bfsvc.exe" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1972
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\kernel32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:284
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\kernel32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1924
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\advapi32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1072
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\advapi32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1292
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\user32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1576
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\user32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:932
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\gdi32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1488
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\gdi32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:704
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\win32k.sys"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1968
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\win32k.sys" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1696
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\ntdll.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:692
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\ntdll.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1400
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\hall.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1260
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\hal.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1876

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Permissions Modification

1
T1222

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3535.tmp\3536.tmp\3537.bat
    Filesize

    1KB

    MD5

    e666a33a40b3660f6f1ac5ce390d856a

    SHA1

    9ae70be123a8a7837c314030c06202ee61cbf52e

    SHA256

    8c50b2f52383a41d0186436281f4f804144ef1dcd12dd638840e32d4cc2c6488

    SHA512

    69c59de096b6ebc30629b8d63a8fab1870e3a466c8d36edd31384ed6f0c19e50b17ed56b9779960513a2da2a9dedde4d27e755bb084499220fda719dfb74be5d

  • memory/280-55-0x0000000000000000-mapping.dmp
  • memory/284-63-0x0000000000000000-mapping.dmp
  • memory/692-73-0x0000000000000000-mapping.dmp
  • memory/704-70-0x0000000000000000-mapping.dmp
  • memory/844-58-0x0000000000000000-mapping.dmp
  • memory/872-60-0x0000000000000000-mapping.dmp
  • memory/932-68-0x0000000000000000-mapping.dmp
  • memory/972-54-0x000007FEFB971000-0x000007FEFB973000-memory.dmp
    Filesize

    8KB

  • memory/1072-65-0x0000000000000000-mapping.dmp
  • memory/1076-57-0x0000000000000000-mapping.dmp
  • memory/1260-75-0x0000000000000000-mapping.dmp
  • memory/1292-66-0x0000000000000000-mapping.dmp
  • memory/1400-74-0x0000000000000000-mapping.dmp
  • memory/1444-61-0x0000000000000000-mapping.dmp
  • memory/1488-69-0x0000000000000000-mapping.dmp
  • memory/1576-67-0x0000000000000000-mapping.dmp
  • memory/1696-72-0x0000000000000000-mapping.dmp
  • memory/1708-59-0x0000000000000000-mapping.dmp
  • memory/1876-76-0x0000000000000000-mapping.dmp
  • memory/1924-64-0x0000000000000000-mapping.dmp
  • memory/1968-71-0x0000000000000000-mapping.dmp
  • memory/1972-62-0x0000000000000000-mapping.dmp