Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 22:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
shutdownwin10.exe
Resource
win7-20231023-en
6 signatures
150 seconds
General
-
Target
shutdownwin10.exe
-
Size
241KB
-
MD5
89e95190fc60f8f5b624b701a0f63068
-
SHA1
a36ec9dfed535e4b7715725e59d451648f6b644c
-
SHA256
647fe820d5315d3eeb7feed32f083c038e743cb8a4c32281269499126621c8f6
-
SHA512
0f44f96aef70dd86ff31fc6252137bbdcb270c885e84d133e016f86a39eb0bd86daf8d4b82246189aacf7559ecc31a4f8ac78ce3ba2294696d86f8f0a524ad3a
-
SSDEEP
6144:ebRdyCIzMEZ4DQ0SsG4kZ6dyCIzMEZ4DQ0SsG4iq:xlzMKwAZ1lzMKw/
Malware Config
Signatures
-
Possible privilege escalation attempt 2 IoCs
pid Process 3224 takeown.exe 5080 icacls.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation shutdownwin10.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3224 takeown.exe 5080 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\shutdown.exe shutdownwin10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3224 takeown.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5036 wrote to memory of 928 5036 shutdownwin10.exe 86 PID 5036 wrote to memory of 928 5036 shutdownwin10.exe 86 PID 928 wrote to memory of 3224 928 cmd.exe 88 PID 928 wrote to memory of 3224 928 cmd.exe 88 PID 928 wrote to memory of 5080 928 cmd.exe 89 PID 928 wrote to memory of 5080 928 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\shutdownwin10.exe"C:\Users\Admin\AppData\Local\Temp\shutdownwin10.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant "%username%:F"2⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System323⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant "Admin:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5080
-
-