Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
12/03/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
Free Exm Tweaking Utility 3.0.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Free Exm Tweaking Utility 3.0.bat
Resource
win10-20240221-en
General
-
Target
Free Exm Tweaking Utility 3.0.bat
-
Size
167KB
-
MD5
fa1e91d4f21e8a6c82151ffe115223c5
-
SHA1
cd33a6df1ca99df369aada9d52060f307ccc7871
-
SHA256
9d3d3f3b38a350f6e8bdab3c9077694fd1f36e716fda7b3c115cdc840c545b26
-
SHA512
b16a306c0bb5bb80eb21ad56e94878da099fd5a2497e26d119cbe65947ce4baf15588056ed92fa84687e647cbc5988a128a243b88ae26cdb81086126830ee9a6
-
SSDEEP
768:x3sHArcYtdZ9UymYSzDWqsaIZz+QOBRHEnSj+xSKD/jRnRt5hwWbUmPqoYEBs57m:dtr2ymYSznHEnSC/D/jRnxhwYBs57m
Malware Config
Signatures
-
Delays execution with timeout.exe 1 IoCs
pid Process 5080 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4724 powershell.exe 4724 powershell.exe 4724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2344 WMIC.exe Token: SeSecurityPrivilege 2344 WMIC.exe Token: SeTakeOwnershipPrivilege 2344 WMIC.exe Token: SeLoadDriverPrivilege 2344 WMIC.exe Token: SeSystemProfilePrivilege 2344 WMIC.exe Token: SeSystemtimePrivilege 2344 WMIC.exe Token: SeProfSingleProcessPrivilege 2344 WMIC.exe Token: SeIncBasePriorityPrivilege 2344 WMIC.exe Token: SeCreatePagefilePrivilege 2344 WMIC.exe Token: SeBackupPrivilege 2344 WMIC.exe Token: SeRestorePrivilege 2344 WMIC.exe Token: SeShutdownPrivilege 2344 WMIC.exe Token: SeDebugPrivilege 2344 WMIC.exe Token: SeSystemEnvironmentPrivilege 2344 WMIC.exe Token: SeRemoteShutdownPrivilege 2344 WMIC.exe Token: SeUndockPrivilege 2344 WMIC.exe Token: SeManageVolumePrivilege 2344 WMIC.exe Token: 33 2344 WMIC.exe Token: 34 2344 WMIC.exe Token: 35 2344 WMIC.exe Token: 36 2344 WMIC.exe Token: SeIncreaseQuotaPrivilege 2344 WMIC.exe Token: SeSecurityPrivilege 2344 WMIC.exe Token: SeTakeOwnershipPrivilege 2344 WMIC.exe Token: SeLoadDriverPrivilege 2344 WMIC.exe Token: SeSystemProfilePrivilege 2344 WMIC.exe Token: SeSystemtimePrivilege 2344 WMIC.exe Token: SeProfSingleProcessPrivilege 2344 WMIC.exe Token: SeIncBasePriorityPrivilege 2344 WMIC.exe Token: SeCreatePagefilePrivilege 2344 WMIC.exe Token: SeBackupPrivilege 2344 WMIC.exe Token: SeRestorePrivilege 2344 WMIC.exe Token: SeShutdownPrivilege 2344 WMIC.exe Token: SeDebugPrivilege 2344 WMIC.exe Token: SeSystemEnvironmentPrivilege 2344 WMIC.exe Token: SeRemoteShutdownPrivilege 2344 WMIC.exe Token: SeUndockPrivilege 2344 WMIC.exe Token: SeManageVolumePrivilege 2344 WMIC.exe Token: 33 2344 WMIC.exe Token: 34 2344 WMIC.exe Token: 35 2344 WMIC.exe Token: 36 2344 WMIC.exe Token: SeDebugPrivilege 4724 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2644 wrote to memory of 4040 2644 cmd.exe 75 PID 2644 wrote to memory of 4040 2644 cmd.exe 75 PID 4040 wrote to memory of 2344 4040 cmd.exe 76 PID 4040 wrote to memory of 2344 4040 cmd.exe 76 PID 4040 wrote to memory of 3364 4040 cmd.exe 77 PID 4040 wrote to memory of 3364 4040 cmd.exe 77 PID 2644 wrote to memory of 4724 2644 cmd.exe 79 PID 2644 wrote to memory of 4724 2644 cmd.exe 79 PID 2644 wrote to memory of 4916 2644 cmd.exe 81 PID 2644 wrote to memory of 4916 2644 cmd.exe 81 PID 2644 wrote to memory of 4572 2644 cmd.exe 82 PID 2644 wrote to memory of 4572 2644 cmd.exe 82 PID 2644 wrote to memory of 1268 2644 cmd.exe 83 PID 2644 wrote to memory of 1268 2644 cmd.exe 83 PID 2644 wrote to memory of 2936 2644 cmd.exe 84 PID 2644 wrote to memory of 2936 2644 cmd.exe 84 PID 2644 wrote to memory of 800 2644 cmd.exe 85 PID 2644 wrote to memory of 800 2644 cmd.exe 85 PID 2644 wrote to memory of 5080 2644 cmd.exe 86 PID 2644 wrote to memory of 5080 2644 cmd.exe 86 PID 2644 wrote to memory of 1520 2644 cmd.exe 87 PID 2644 wrote to memory of 1520 2644 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Free Exm Tweaking Utility 3.0.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_UserAccount where name="Admin" get sid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\system32\findstr.exefindstr "S-"3⤵PID:3364
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:4916
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:4572
-
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:1268
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:2936
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:800
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:5080
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:1520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a