Analysis
-
max time kernel
58s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/04/2023, 23:28
Errors
General
-
Target
Windows Loader 2.2.2..exe
-
Size
3.8MB
-
MD5
323c0fd51071400b51eedb1be90a8188
-
SHA1
0efc35935957c25193bbe9a83ab6caa25a487ada
-
SHA256
2f2aba1e074f5f4baa08b524875461889f8f04d4ffc43972ac212e286022ab94
-
SHA512
4c501c7135962e2f02b68d6069f2191ddb76f990528dacd209955a44972122718b9598400ba829abab2d4345b4e1a4b93453c8e7ba42080bd492a34cf8443e7e
-
SSDEEP
49152:cEYCFEvlmOmTgtFM3uK5m3imrHuiff+puWV355FXw/+zuWV355FXw/+DuWV355FP:cEYzEFTgtFM3ukm3imPnt
Malware Config
Signatures
-
Possible privilege escalation attempt 4 IoCs
pid Process 1764 icacls.exe 1416 takeown.exe 1388 icacls.exe 1068 takeown.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Windows Loader 2.2.2..exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Windows Loader 2.2.2..exe -
Executes dropped EXE 1 IoCs
pid Process 316 bootsect.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 1068 takeown.exe 1764 icacls.exe 1416 takeown.exe 1388 icacls.exe -
resource yara_rule behavioral1/memory/1532-116-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/1532-118-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/1532-119-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/1532-120-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/1532-125-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/1532-139-0x0000000000400000-0x0000000000623000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Windows Loader 2.2.2..exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Windows Loader 2.2.2..exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1532 Windows Loader 2.2.2..exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: 33 1532 Windows Loader 2.2.2..exe Token: SeIncBasePriorityPrivilege 1532 Windows Loader 2.2.2..exe Token: 33 1532 Windows Loader 2.2.2..exe Token: SeIncBasePriorityPrivilege 1532 Windows Loader 2.2.2..exe Token: SeTakeOwnershipPrivilege 1068 takeown.exe Token: SeShutdownPrivilege 1352 shutdown.exe Token: SeRemoteShutdownPrivilege 1352 shutdown.exe Token: 33 672 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 672 AUDIODG.EXE Token: 33 672 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 672 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 Windows Loader 2.2.2..exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1944 1532 Windows Loader 2.2.2..exe 30 PID 1532 wrote to memory of 1944 1532 Windows Loader 2.2.2..exe 30 PID 1532 wrote to memory of 1944 1532 Windows Loader 2.2.2..exe 30 PID 1532 wrote to memory of 1944 1532 Windows Loader 2.2.2..exe 30 PID 1944 wrote to memory of 1680 1944 cmd.exe 32 PID 1944 wrote to memory of 1680 1944 cmd.exe 32 PID 1944 wrote to memory of 1680 1944 cmd.exe 32 PID 1944 wrote to memory of 1680 1944 cmd.exe 32 PID 1680 wrote to memory of 1068 1680 cmd.exe 33 PID 1680 wrote to memory of 1068 1680 cmd.exe 33 PID 1680 wrote to memory of 1068 1680 cmd.exe 33 PID 1680 wrote to memory of 1068 1680 cmd.exe 33 PID 1532 wrote to memory of 1772 1532 Windows Loader 2.2.2..exe 34 PID 1532 wrote to memory of 1772 1532 Windows Loader 2.2.2..exe 34 PID 1532 wrote to memory of 1772 1532 Windows Loader 2.2.2..exe 34 PID 1532 wrote to memory of 1772 1532 Windows Loader 2.2.2..exe 34 PID 1772 wrote to memory of 1764 1772 cmd.exe 36 PID 1772 wrote to memory of 1764 1772 cmd.exe 36 PID 1772 wrote to memory of 1764 1772 cmd.exe 36 PID 1772 wrote to memory of 1764 1772 cmd.exe 36 PID 1532 wrote to memory of 1660 1532 Windows Loader 2.2.2..exe 37 PID 1532 wrote to memory of 1660 1532 Windows Loader 2.2.2..exe 37 PID 1532 wrote to memory of 1660 1532 Windows Loader 2.2.2..exe 37 PID 1532 wrote to memory of 1660 1532 Windows Loader 2.2.2..exe 37 PID 1660 wrote to memory of 1644 1660 cmd.exe 39 PID 1660 wrote to memory of 1644 1660 cmd.exe 39 PID 1660 wrote to memory of 1644 1660 cmd.exe 39 PID 1660 wrote to memory of 1644 1660 cmd.exe 39 PID 1644 wrote to memory of 1416 1644 cmd.exe 40 PID 1644 wrote to memory of 1416 1644 cmd.exe 40 PID 1644 wrote to memory of 1416 1644 cmd.exe 40 PID 1644 wrote to memory of 1416 1644 cmd.exe 40 PID 1532 wrote to memory of 1456 1532 Windows Loader 2.2.2..exe 41 PID 1532 wrote to memory of 1456 1532 Windows Loader 2.2.2..exe 41 PID 1532 wrote to memory of 1456 1532 Windows Loader 2.2.2..exe 41 PID 1532 wrote to memory of 1456 1532 Windows Loader 2.2.2..exe 41 PID 1456 wrote to memory of 1388 1456 cmd.exe 43 PID 1456 wrote to memory of 1388 1456 cmd.exe 43 PID 1456 wrote to memory of 1388 1456 cmd.exe 43 PID 1456 wrote to memory of 1388 1456 cmd.exe 43 PID 1532 wrote to memory of 1496 1532 Windows Loader 2.2.2..exe 44 PID 1532 wrote to memory of 1496 1532 Windows Loader 2.2.2..exe 44 PID 1532 wrote to memory of 1496 1532 Windows Loader 2.2.2..exe 44 PID 1532 wrote to memory of 1496 1532 Windows Loader 2.2.2..exe 44 PID 1496 wrote to memory of 1640 1496 cmd.exe 46 PID 1496 wrote to memory of 1640 1496 cmd.exe 46 PID 1496 wrote to memory of 1640 1496 cmd.exe 46 PID 1532 wrote to memory of 1288 1532 Windows Loader 2.2.2..exe 47 PID 1532 wrote to memory of 1288 1532 Windows Loader 2.2.2..exe 47 PID 1532 wrote to memory of 1288 1532 Windows Loader 2.2.2..exe 47 PID 1532 wrote to memory of 1288 1532 Windows Loader 2.2.2..exe 47 PID 1288 wrote to memory of 1544 1288 cmd.exe 49 PID 1288 wrote to memory of 1544 1288 cmd.exe 49 PID 1288 wrote to memory of 1544 1288 cmd.exe 49 PID 1532 wrote to memory of 1724 1532 Windows Loader 2.2.2..exe 51 PID 1532 wrote to memory of 1724 1532 Windows Loader 2.2.2..exe 51 PID 1532 wrote to memory of 1724 1532 Windows Loader 2.2.2..exe 51 PID 1532 wrote to memory of 1724 1532 Windows Loader 2.2.2..exe 51 PID 1724 wrote to memory of 1512 1724 cmd.exe 53 PID 1724 wrote to memory of 1512 1724 cmd.exe 53 PID 1724 wrote to memory of 1512 1724 cmd.exe 53 PID 1724 wrote to memory of 1512 1724 cmd.exe 53 PID 1532 wrote to memory of 1732 1532 Windows Loader 2.2.2..exe 54 PID 1532 wrote to memory of 1732 1532 Windows Loader 2.2.2..exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows Loader 2.2.2..exe"C:\Users\Admin\AppData\Local\Temp\Windows Loader 2.2.2..exe"1⤵
- Checks BIOS information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe /c takeown /f C:\ldrscan\bootwin"2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\ldrscan\bootwin3⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\ldrscan\bootwin4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)"2⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\icacls.exeicacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe /c takeown /f C:\ldrscan\bootwin"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\ldrscan\bootwin3⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\ldrscan\bootwin4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1416
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)"2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\icacls.exeicacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1388
-
-
-
C:\Windows\system32\cmd.execmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ilc "C:\Acer.XRM-MS""2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\System32\cscript.exeC:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ilc "C:\Acer.XRM-MS"3⤵PID:1640
-
-
-
C:\Windows\system32\cmd.execmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ipk FJGCP-4DFJD-GJY49-VJBQ7-HYRR2"2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\System32\cscript.exeC:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ipk FJGCP-4DFJD-GJY49-VJBQ7-HYRR23⤵PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "compact /u \\?\Volume{b3ac5a43-b1b4-11ed-a5ad-806e6f6e6963}\LMFTS"2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\compact.execompact /u \\?\Volume{b3ac5a43-b1b4-11ed-a5ad-806e6f6e6963}\LMFTS3⤵PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "C:\bootsect.exe /nt60 SYS /force"2⤵PID:1732
-
C:\bootsect.exeC:\bootsect.exe /nt60 SYS /force3⤵
- Executes dropped EXE
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "shutdown -r -t 0"2⤵PID:1784
-
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1624
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x47c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:672
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f25832af6a684360950dbb15589de34a
SHA117ff1d21005c1695ae3dcbdc3435017c895fff5d
SHA256266d64637cf12ff961165a018f549ff41002dc59380605b36d65cf1b8127c96f
SHA512e0cf23351c02f4afa85eedc72a86b9114f539595cbd6bcd220e8b8d70fa6a7379dcd947ea0d59332ba672f36ebda6bd98892d9b6b20eedafc8be168387a3dd5f
-
Filesize
95KB
MD5a062e202e6101250f485fc679e2aef82
SHA19c18280712e8012d590b63dc90e42b88d6971c9b
SHA25632edfecff169c82107f520f6b2a6b56d14f714ef22be7aef9676082e89a5525e
SHA512d02e9a8708b0e4a99b623cc3525105ecd48ef79e7f9bfac6d34cadd38c31ff9bf2485f1d84f33f5e9057bf0c3603b86bab6003ee876f865e2f5ca04ddb394379
-
Filesize
95KB
MD5a062e202e6101250f485fc679e2aef82
SHA19c18280712e8012d590b63dc90e42b88d6971c9b
SHA25632edfecff169c82107f520f6b2a6b56d14f714ef22be7aef9676082e89a5525e
SHA512d02e9a8708b0e4a99b623cc3525105ecd48ef79e7f9bfac6d34cadd38c31ff9bf2485f1d84f33f5e9057bf0c3603b86bab6003ee876f865e2f5ca04ddb394379
-
Filesize
301KB
MD565d2cb2335caef8fcd8b2e250b395fb7
SHA1211cd0c5b6aabe003111d0abfe112b896808286b
SHA256a9cb332b98f76372b56e9bb96de6011a7cad57cb6dfec1f585b1ba53ee9984ab
SHA512810867c04783ff9a37c858385357160feb2e9803ff01f5d221174c6e8c81a3e2da266b27b2c87959c237861aba48f0565510a34575da636fcb8c07ff8ca5c237