Resubmissions

09/04/2024, 16:57

240409-vgf2magd4z 9

09/04/2024, 16:54

240409-vevr1ach64 9

09/04/2024, 16:51

240409-vc161agc3x 9

Analysis

  • max time kernel
    79s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 16:51

General

  • Target

    winrm.exe

  • Size

    237KB

  • MD5

    df064a338e25472686ea67ba3c01e780

  • SHA1

    74ee5ba66f2593c40842607a7d322f2025c7d087

  • SHA256

    dd8cef242016ac16e7d62b63dbb946481b751a339efb79911da1d4c654246097

  • SHA512

    b4848baf036a380882734aad30c1e35fc8d3930b04af018767522ce29b4400ed366480f00fa8379985527aa044bc3c26adfdd8d3395cd09c50d40dac36abe3e9

  • SSDEEP

    3072:K0F1weiSOsF1DUREGAltfZP+fqJIiJHnbsI+cnl2fZd+G:v1JiSoEGAlVpEqXnbsvcnI

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\winrm.exe
    "C:\Users\Admin\AppData\Local\Temp\winrm.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /c net localgroup "Administrators" | find "Admin"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Windows\system32\net.exe
        net localgroup "Administrators"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2928
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 localgroup "Administrators"
          4⤵
            PID:2940
        • C:\Windows\system32\find.exe
          find "Admin"
          3⤵
            PID:2480
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /c net user Admin
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Windows\system32\net.exe
            net user Admin
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2776
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 user Admin
              4⤵
                PID:2396
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c net user Admin admin15
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2452
            • C:\Windows\system32\net.exe
              net user Admin admin15
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1732
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user Admin admin15
                4⤵
                  PID:2860
            • C:\Windows\system32\reg.exe
              "reg.exe" save HKLM\sam .\sam.reg
              2⤵
                PID:1972
              • C:\Windows\system32\reg.exe
                "reg.exe" save HKLM\system .\system.reg
                2⤵
                  PID:2168

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/2084-0-0x0000000001230000-0x0000000001270000-memory.dmp

                Filesize

                256KB

              • memory/2084-1-0x000007FEF5BC0000-0x000007FEF65AC000-memory.dmp

                Filesize

                9.9MB

              • memory/2084-2-0x0000000000FA0000-0x0000000001020000-memory.dmp

                Filesize

                512KB

              • memory/2084-3-0x0000000000FA0000-0x0000000001020000-memory.dmp

                Filesize

                512KB

              • memory/2084-4-0x000007FEF5BC0000-0x000007FEF65AC000-memory.dmp

                Filesize

                9.9MB

              • memory/2084-5-0x0000000000FA0000-0x0000000001020000-memory.dmp

                Filesize

                512KB

              • memory/2084-7-0x000007FEF5BC0000-0x000007FEF65AC000-memory.dmp

                Filesize

                9.9MB