Analysis

  • max time kernel
    139s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2023 19:16

General

  • Target

    Abantes.exe

  • Size

    2.7MB

  • MD5

    cd2e58136d3049e9be40ae29f9250c93

  • SHA1

    e97beb8b87d130e5c5745981e3614ed6aa3caae3

  • SHA256

    dac4b5511343cf863832e38886af8a3e1d55529648314eb02cc21fa3979f6419

  • SHA512

    3ad23ad35d23acfa9edc187f443f28c4bb11279472632726f450b10cc09a653e10f4832f9cca44d063ad1259de6c7017ca6ca8f64ed07d302c3b2d06628f0ba7

  • SSDEEP

    49152:yi98eUDa7+tCg3e+zNWZjUDa7+tCg3e+zNWyUDa7+tCg3e+zNWR9Bh:yAC+7+p3ej2+7+p3ejh+7+p3ejDBh

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Possible privilege escalation attempt 14 IoCs
  • Sets file execution options in registry 2 TTPs 49 IoCs
  • Modifies file permissions 1 TTPs 14 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 17 IoCs
  • Delays execution with timeout.exe 2 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 16 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Abantes.exe
    "C:\Users\Admin\AppData\Local\Temp\Abantes.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Sets file execution options in registry
    • Modifies system executable filetype association
    • Checks whether UAC is enabled
    • Modifies WinLogon
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1084
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Windows\Defender\Action.bat""
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f logonui.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1988
      • C:\Windows\SysWOW64\icacls.exe
        icacls logonui.exe /granted Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:848
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f "C:\Windows\System32\en-US" /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1276
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\System32\en-US" /granted Admin:F /T /C
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1184
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f explorer.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1816
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f regedit.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f HelpPane.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1148
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f "C:\Windows\Temp" /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:968
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f "C:\Windows\en-US" /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1776
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\Temp" /granted Admin:F /T /C
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:940
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\en-US" /granted Admin:F /T /C
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1560
      • C:\Windows\SysWOW64\icacls.exe
        icacls regedit.exe /granted Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2036
      • C:\Windows\SysWOW64\icacls.exe
        icacls explorer.exe /granted Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1820
      • C:\Windows\SysWOW64\icacls.exe
        icacls HelpPane.exe /granted Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1160
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic useraccount where name='Admin' set FullName='Abantes Was Here'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1972
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic useraccount where name='Admin' rename 'Abantes Was Here'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:524
      • C:\Windows\SysWOW64\netsh.exe
        NetSh Advfirewall set allprofiles state off
        3⤵
        • Modifies Windows Firewall
        PID:920
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1280
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im explorer.exe
        3⤵
        • Kills process with taskkill
        PID:912
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT 1
        3⤵
        • Delays execution with timeout.exe
        PID:1644
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT 2
        3⤵
        • Delays execution with timeout.exe
        PID:1708
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:720

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Defender\Action.bat

      Filesize

      1KB

      MD5

      8b3585b4f84496c306b6c082ea6e52ef

      SHA1

      04bf1cf0f68a571e746fb7c863f71fa70e0e79d3

      SHA256

      d06d5f8501501af5677b133ff7aa531ccf1bf9b2673a1f26117f0420532b599e

      SHA512

      733bb98473fc8b3c8f0f96ff5ccec9212c36f7162742ee124d6a0edd0186e171ec61de97a3268663812802c90d29cd1e5077af72e02f550d94d67ebe106c0591

    • C:\Windows\Defender\Action.bat

      Filesize

      1KB

      MD5

      8b3585b4f84496c306b6c082ea6e52ef

      SHA1

      04bf1cf0f68a571e746fb7c863f71fa70e0e79d3

      SHA256

      d06d5f8501501af5677b133ff7aa531ccf1bf9b2673a1f26117f0420532b599e

      SHA512

      733bb98473fc8b3c8f0f96ff5ccec9212c36f7162742ee124d6a0edd0186e171ec61de97a3268663812802c90d29cd1e5077af72e02f550d94d67ebe106c0591

    • C:\Windows\Defender\authui.dll.mui

      Filesize

      21KB

      MD5

      a3a8fb6325f2f4fd31039775be19a9a4

      SHA1

      dba1acba938c8720b23b992ef77f130b6dbe7428

      SHA256

      6baf83c2c45f0e3a1a1dedc799cce6adb766dabe25baa847f9dd308aae0218eb

      SHA512

      9a03528d3b1a6a0bc3fbce6149d1cf6e21fe629c53d1b93954e6147cdfbf95eb272e75dbf906e38a1981706e71f679fda680cdf8601491ba792576c9b54d043e

    • C:\Windows\Defender\explorer.exe.mui

      Filesize

      15KB

      MD5

      39f1a6a8b713fcf30afc03ea3c936f85

      SHA1

      9209b25730c7896e047e5a4fc1da73c294e55c0e

      SHA256

      b69b61675531060d350a795a53568ccf19a146060cebb659ebc658a0e8b27fc9

      SHA512

      82b402b1c94fb8444e9d32f10becad994715667fc36d427faf6ae4f433c8e7025c3ca387e6cae7fb4e14f2e9f36446354c1c2585445fd79e7673b78419232780

    • memory/1084-54-0x0000000000340000-0x00000000005F8000-memory.dmp

      Filesize

      2.7MB

    • memory/1084-55-0x00000000022B0000-0x0000000002304000-memory.dmp

      Filesize

      336KB

    • memory/1084-56-0x00000000006B0000-0x00000000006F0000-memory.dmp

      Filesize

      256KB

    • memory/1084-86-0x00000000006B0000-0x00000000006F0000-memory.dmp

      Filesize

      256KB