Analysis

  • max time kernel
    91s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2023 03:24

General

  • Target

    banish.exe

  • Size

    32KB

  • MD5

    4a43ea617017d5de7d93eb2380634eee

  • SHA1

    b0af5aa27cd0e49955f1ab2d18d69f7bc8fd4d21

  • SHA256

    dfa5b7bbc23df9a1402063551c44eede0c9445b930291027830b3af0fbe4a549

  • SHA512

    c241538ccf8feeb115dec39fc5f668675769b2681d96d77bca1f5d826a4841ddbf8ed0f167bdee1ec70d623b7a6382c88a3aa3b85083898a71585ca47796852e

  • SSDEEP

    384:uEXkzu37tf1A3aXFDy7ZdAhqegVBJi/N5ZV6EMRbQaWTjwiewhOY85RGy+fzzFtC:u+euRG38y78h8g6EMRb9WXwiel3Gyyt

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\banish.exe
    "C:\Users\Admin\AppData\Local\Temp\banish.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\banish.cmd""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Windows\SysWOW64\takeown.exe
        TAKEOWN /F ""
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4980
      • C:\Windows\SysWOW64\icacls.exe
        ICACLS "" /grant "Admin":F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:5000

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Permissions Modification

1
T1222

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\banish.cmd
    Filesize

    760B

    MD5

    4f4199874adea9219f1e4ad27d97d9c4

    SHA1

    dc1dae4f4865f84e1d0f572cacd94f48b83fa289

    SHA256

    099a497b7b971d87d0f8c17ce37d1c675e9d6d75d5c1e605c45d85e54c26a2ff

    SHA512

    c703c4c89ec94d2578e2b96110724fb08e5289c7e0db51f47e4bfd6be14d684223e0dfc2dfe978aa56eb8037a4bea514464e582ac3363ed1f506cba1aeaf6017

  • memory/2292-132-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2292-137-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/4944-133-0x0000000000000000-mapping.dmp
  • memory/4980-135-0x0000000000000000-mapping.dmp
  • memory/5000-136-0x0000000000000000-mapping.dmp