Analysis
-
max time kernel
129s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 22:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
shutdownwin10.exe
Resource
win7-20231023-en
6 signatures
150 seconds
General
-
Target
shutdownwin10.exe
-
Size
241KB
-
MD5
89e95190fc60f8f5b624b701a0f63068
-
SHA1
a36ec9dfed535e4b7715725e59d451648f6b644c
-
SHA256
647fe820d5315d3eeb7feed32f083c038e743cb8a4c32281269499126621c8f6
-
SHA512
0f44f96aef70dd86ff31fc6252137bbdcb270c885e84d133e016f86a39eb0bd86daf8d4b82246189aacf7559ecc31a4f8ac78ce3ba2294696d86f8f0a524ad3a
-
SSDEEP
6144:ebRdyCIzMEZ4DQ0SsG4kZ6dyCIzMEZ4DQ0SsG4iq:xlzMKwAZ1lzMKw/
Malware Config
Signatures
-
Possible privilege escalation attempt 2 IoCs
pid Process 2516 takeown.exe 2540 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2516 takeown.exe 2540 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\shutdown.exe shutdownwin10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2516 takeown.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2376 2620 shutdownwin10.exe 29 PID 2620 wrote to memory of 2376 2620 shutdownwin10.exe 29 PID 2620 wrote to memory of 2376 2620 shutdownwin10.exe 29 PID 2376 wrote to memory of 2516 2376 cmd.exe 31 PID 2376 wrote to memory of 2516 2376 cmd.exe 31 PID 2376 wrote to memory of 2516 2376 cmd.exe 31 PID 2376 wrote to memory of 2540 2376 cmd.exe 32 PID 2376 wrote to memory of 2540 2376 cmd.exe 32 PID 2376 wrote to memory of 2540 2376 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\shutdownwin10.exe"C:\Users\Admin\AppData\Local\Temp\shutdownwin10.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant "%username%:F"2⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System323⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant "Admin:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2540
-
-