Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
10-Strike Networ.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10-Strike Networ.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
10-Strike Networ.exe
-
Size
820KB
-
MD5
6149e368eb803b57137cc3a06f4a498f
-
SHA1
29e7618877b5a6d34bd6c5d4c4ef1d54bf783163
-
SHA256
b7526ac48d6c5aabeedf6ae17d96a8b40b64db7f6de812e8bc17db86a71f902e
-
SHA512
e8a21fcc8925c341ed5dccf68d25dee2293558f6c8f6d5c9b3c47b1ad08d91e72576aeace03ddc6f28df2be821c0852a476136cbccdf055136e7712b1b809268
-
SSDEEP
24576:UChFAOkHEaeP7kA3KXcjWlCoQwCQeQyhJw:5TkkaeTtClC9uUw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 10-Strike Networ.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Wine 10-Strike Networ.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 10-Strike Networ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2080 10-Strike Networ.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 10-Strike Networ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2080 10-Strike Networ.exe 2080 10-Strike Networ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 10-Strike Networ.exe Token: SeShutdownPrivilege 2080 10-Strike Networ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2080 10-Strike Networ.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 10-Strike Networ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 10-Strike Networ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10-Strike Networ.exe"C:\Users\Admin\AppData\Local\Temp\10-Strike Networ.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2080
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1492
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1280
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1