Resubmissions

25/04/2023, 20:18

230425-y3j7yscg23 10

Analysis

  • max time kernel
    505s
  • max time network
    509s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 20:18

General

  • Target

    Executables/AtlasModules/Scripts/toggleDev.cmd

  • Size

    2KB

  • MD5

    0fc5e92349540a7b7b27e7789bead68b

  • SHA1

    47ee8a756177cea917ebf48b310f37d5d731a5a1

  • SHA256

    0907166805d83bde4d169ead6641a3f82c5c6a694d158455f1bb1471a5d33a24

  • SHA512

    5989bd61248920b57bb106615c39b44cb0a47400a44001beea078d2d56d7892ccb198e8a5c2311e802b4b3103e7c48d40d0a91fbfe4d41fc81ac966aed017f5c

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 48 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:660
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -win 1 -nop -c iex $env:R; # RunAsTI
        2⤵
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Windows\system32\whoami.exe
          "C:\Windows\system32\whoami.exe" /groups
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1000
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\toggleDev.cmd" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Windows\system32\find.exe
            find /i "S-1-5-18"
            4⤵
              PID:2872
            • C:\Windows\system32\whoami.exe
              whoami /user
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4360
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\toggleDev.cmd"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4432
        • C:\Windows\system32\whoami.exe
          whoami /user
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4168
        • C:\Windows\system32\find.exe
          find /i "S-1-5-18"
          2⤵
            PID:4756
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            PowerShell -NoProfile -Command "$argv = $input | ?{$_}; iex (${C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\RunAsTI.cmd} | out-string)"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Windows\system32\whoami.exe
              "C:\Windows\system32\whoami.exe" /user
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3024
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 -nop -c $cmd='C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\toggleDev.cmd'; $arg=''; $id='RunAsTI'; $key='Registry::HKU\S-1-5-21-1013461898-3711306144-4198452673-1000\Volatile Environment'; $env:R=(gi $key -ea 0).getvalue($id)-join''; iex $env:R
              3⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1796
              • C:\Windows\system32\whoami.exe
                "C:\Windows\system32\whoami.exe" /groups
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2368
              • C:\Windows\system32\sc.exe
                "C:\Windows\system32\sc.exe" start TrustedInstaller
                4⤵
                • Launches sc.exe
                PID:2672
              • C:\Windows\system32\sc.exe
                "C:\Windows\system32\sc.exe" start lsass
                4⤵
                • Launches sc.exe
                PID:1776
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" ( FOR %I in ("C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\RunAsTI.cmd" "C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\toggleDev.cmd" "") do @ echo(%~I )"
            2⤵
              PID:4172

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            556084f2c6d459c116a69d6fedcc4105

            SHA1

            633e89b9a1e77942d822d14de6708430a3944dbc

            SHA256

            88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

            SHA512

            0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            b90efd974eddd9f07d74e6daa9285779

            SHA1

            eab0a1356a4bbd54f8d2f0d1b1373c5ec5dcb3bb

            SHA256

            b525be72aa216eb30620c35eb5bb4dd6f40e2a05998d7886a0a86c1b3ca05272

            SHA512

            d7c27366fd984c10d99a51d48944ebf4525b95a201705169ecf5242a802669eb9964fc2afefb1eaae8c91cda265d4e5e508a71697eb9e807160a6097e00e53ff

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            8f8975f905fea12e03eb6c147ddb4059

            SHA1

            34953a9f7f10163134b34f267852822e28abf117

            SHA256

            7cb219dbf6948d2be10410dfa4bb7dae9f16e4736dd9bd9e899679c8e7148131

            SHA512

            da4e9adf77d3cc15851b05abac127d25eca31b1c12b425e231117520062422cdf8ea678a5d08a43a909d81e1573e43778c85bd4ce47181f4f0c1e310e8957f86

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o3wyfvtp.j4y.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/552-144-0x0000020F3C3B0000-0x0000020F3C3C0000-memory.dmp

            Filesize

            64KB

          • memory/552-143-0x0000020F3C3B0000-0x0000020F3C3C0000-memory.dmp

            Filesize

            64KB

          • memory/552-142-0x0000020F56400000-0x0000020F56422000-memory.dmp

            Filesize

            136KB

          • memory/1796-158-0x000001A198100000-0x000001A198110000-memory.dmp

            Filesize

            64KB

          • memory/1796-159-0x000001A198100000-0x000001A198110000-memory.dmp

            Filesize

            64KB

          • memory/1796-162-0x000001A198100000-0x000001A198110000-memory.dmp

            Filesize

            64KB

          • memory/1908-174-0x000001FBF0700000-0x000001FBF0710000-memory.dmp

            Filesize

            64KB

          • memory/1908-175-0x000001FBF0700000-0x000001FBF0710000-memory.dmp

            Filesize

            64KB

          • memory/1908-176-0x000001FBF0700000-0x000001FBF0710000-memory.dmp

            Filesize

            64KB