Analysis

  • max time kernel
    159s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 16:59

General

  • Target

    c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe

  • Size

    134KB

  • MD5

    cf174472200c2c0205782d352735b594

  • SHA1

    1e462e8c90aaec05f6dfbb3d91e5b8e5fd610517

  • SHA256

    c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9

  • SHA512

    3293c8eb7d5515e100c17febebab81065f474d82b314e1cdc0e65d3a4aea789ecf412ca0807e5a2ba518593697bfe1547553133696c8c7c1a21662a31a4be3c8

  • SSDEEP

    3072:kV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPLipC+r:Jt5hBPi0BW69hd1MMdxPe9N9uA069TBc

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 20 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe
    "C:\Users\Admin\AppData\Local\Temp\c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D372.tmp\D373.tmp\D374.bat C:\Users\Admin\AppData\Local\Temp\c6b655a26540651f5f6d9e4c125c2d092a05c3f3de517d15c55025092a307ea9.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\ntoskrnl.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:4156
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\ntoskrnl.exe" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4276
      • C:\Windows\system32\takeown.exe
        takeown -r -f -skipsl "C:\Windows\Boot"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4296
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\Boot" /t /c /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:5088
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\bfsvc.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1392
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\bfsvc.exe" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:3720
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\kernel32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\kernel32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1120
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\advapi32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\advapi32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1692
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\user32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1432
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\user32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1468
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\gdi32.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:308
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\gdi32.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:3236
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\win32k.sys"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:3112
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\win32k.sys" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:3608
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\ntdll.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:3864
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\ntdll.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4684
      • C:\Windows\system32\takeown.exe
        takeown -f "C:\Windows\System32\hall.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
      • C:\Windows\system32\icacls.exe
        ICACLS "C:\Windows\System32\hal.dll" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4136

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\D372.tmp\D373.tmp\D374.bat
    Filesize

    1KB

    MD5

    e666a33a40b3660f6f1ac5ce390d856a

    SHA1

    9ae70be123a8a7837c314030c06202ee61cbf52e

    SHA256

    8c50b2f52383a41d0186436281f4f804144ef1dcd12dd638840e32d4cc2c6488

    SHA512

    69c59de096b6ebc30629b8d63a8fab1870e3a466c8d36edd31384ed6f0c19e50b17ed56b9779960513a2da2a9dedde4d27e755bb084499220fda719dfb74be5d

  • memory/308-147-0x0000000000000000-mapping.dmp
  • memory/1120-142-0x0000000000000000-mapping.dmp
  • memory/1392-139-0x0000000000000000-mapping.dmp
  • memory/1432-145-0x0000000000000000-mapping.dmp
  • memory/1468-146-0x0000000000000000-mapping.dmp
  • memory/1552-133-0x0000000000000000-mapping.dmp
  • memory/1676-143-0x0000000000000000-mapping.dmp
  • memory/1692-144-0x0000000000000000-mapping.dmp
  • memory/2676-141-0x0000000000000000-mapping.dmp
  • memory/3112-149-0x0000000000000000-mapping.dmp
  • memory/3236-148-0x0000000000000000-mapping.dmp
  • memory/3608-150-0x0000000000000000-mapping.dmp
  • memory/3720-140-0x0000000000000000-mapping.dmp
  • memory/3864-151-0x0000000000000000-mapping.dmp
  • memory/4136-154-0x0000000000000000-mapping.dmp
  • memory/4156-135-0x0000000000000000-mapping.dmp
  • memory/4276-136-0x0000000000000000-mapping.dmp
  • memory/4296-137-0x0000000000000000-mapping.dmp
  • memory/4684-152-0x0000000000000000-mapping.dmp
  • memory/5016-153-0x0000000000000000-mapping.dmp
  • memory/5088-138-0x0000000000000000-mapping.dmp