Analysis

  • max time kernel
    54s
  • max time network
    52s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/01/2024, 14:37

General

  • Target

    sessionsploit.exe

  • Size

    208KB

  • MD5

    ab076c40c794f6fae556eb095d14cfa8

  • SHA1

    4943f12b5549a40d069e97d00420b3d0aab200bf

  • SHA256

    e04f83a60e6849f62e49e79aecd3644e5f7257a7e5e47c765cca0c9b287b369c

  • SHA512

    8e509f9b4c893f243d937b8dc2b69d7bc491936abf1ba7e25009e4120b5f5a55a9092acfb7fa4c968cc40c9b8e97c3d464d251ef85a720585f8c18d401b82cf5

  • SSDEEP

    1536:AH6UMZGECgfV3X1mq1dF/1bJbsIeZueZ8hck+4dAO2VfbNjIal1ukBhpTJAAr:AH6USn1tnbsI+cnl2fZd+s

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sessionsploit.exe
    "C:\Users\Admin\AppData\Local\Temp\sessionsploit.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c net localgroup "Administrators" | find "Admin"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:196
      • C:\Windows\system32\net.exe
        net localgroup "Administrators"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 localgroup "Administrators"
          4⤵
            PID:3200
        • C:\Windows\system32\find.exe
          find "Admin"
          3⤵
            PID:3360
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /c net user Admin moi
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5088
          • C:\Windows\system32\net.exe
            net user Admin moi
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4164
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 user Admin moi
              4⤵
                PID:708
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /c net user Admin | findstr /v "The command completed successfully" | findstr /v "Logon script" | findstr /v "Home directory" | findstr /v "Comment" | findstr /v "group membership" | findstr /v "Group Memberships"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1776
            • C:\Windows\system32\net.exe
              net user Admin
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:420
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user Admin
                4⤵
                  PID:1832
              • C:\Windows\system32\findstr.exe
                findstr /v "The command completed successfully"
                3⤵
                  PID:1688
                • C:\Windows\system32\findstr.exe
                  findstr /v "group membership"
                  3⤵
                    PID:4996
                  • C:\Windows\system32\findstr.exe
                    findstr /v "Comment"
                    3⤵
                      PID:2292
                    • C:\Windows\system32\findstr.exe
                      findstr /v "Home directory"
                      3⤵
                        PID:1940
                      • C:\Windows\system32\findstr.exe
                        findstr /v "Logon script"
                        3⤵
                          PID:3136
                        • C:\Windows\system32\findstr.exe
                          findstr /v "Group Memberships"
                          3⤵
                            PID:3004
                        • C:\Users\Admin\AppData\Local\Temp\tmp2C89.tmp
                          "C:\Users\Admin\AppData\Local\Temp\tmp2C89.tmp" 1
                          2⤵
                          • Executes dropped EXE
                          PID:4976
                      • C:\Windows\system32\LogonUI.exe
                        "LogonUI.exe" /flags:0x0 /state0:0xa3af1855 /state1:0x41c64e6d
                        1⤵
                        • Modifies data under HKEY_USERS
                        • Suspicious use of SetWindowsHookEx
                        PID:700

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\tmp2C89.tmp

                              Filesize

                              23KB

                              MD5

                              ddb4f5dc12ec364dd325a2c63ab5f0de

                              SHA1

                              cf3c725036a7442de1d94f9aa70cfd524da258da

                              SHA256

                              4b5df4ce25bcd9cf635cded7333f5f53d23f57b2adaca1ddf987c4b717f7ffb4

                              SHA512

                              c526b3dbf8dd03f03e0c2453f5e95ed0e9f5a54c00445d21234fbfbffb24d8d4c864d2d45bbe4cc9cc55585586ab13978579a4f2482a86ac5e0c516c6e722a04

                            • memory/4856-0-0x000001AC26100000-0x000001AC26138000-memory.dmp

                              Filesize

                              224KB

                            • memory/4856-1-0x00007FFCD50B0000-0x00007FFCD5A9C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/4856-2-0x000001AC264D0000-0x000001AC264E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4856-3-0x000001AC264D0000-0x000001AC264E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4856-4-0x000001AC264D0000-0x000001AC264E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4856-5-0x00007FFCD50B0000-0x00007FFCD5A9C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/4856-6-0x000001AC264D0000-0x000001AC264E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4856-7-0x000001AC264D0000-0x000001AC264E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4856-8-0x000001AC264D0000-0x000001AC264E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4856-13-0x00007FFCD50B0000-0x00007FFCD5A9C000-memory.dmp

                              Filesize

                              9.9MB