Resubmissions
09/04/2024, 16:57
240409-vgf2magd4z 909/04/2024, 16:54
240409-vevr1ach64 909/04/2024, 16:51
240409-vc161agc3x 9Analysis
-
max time kernel
79s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
winrm.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
winrm.exe
Resource
win10v2004-20240226-en
General
-
Target
winrm.exe
-
Size
237KB
-
MD5
df064a338e25472686ea67ba3c01e780
-
SHA1
74ee5ba66f2593c40842607a7d322f2025c7d087
-
SHA256
dd8cef242016ac16e7d62b63dbb946481b751a339efb79911da1d4c654246097
-
SHA512
b4848baf036a380882734aad30c1e35fc8d3930b04af018767522ce29b4400ed366480f00fa8379985527aa044bc3c26adfdd8d3395cd09c50d40dac36abe3e9
-
SSDEEP
3072:K0F1weiSOsF1DUREGAltfZP+fqJIiJHnbsI+cnl2fZd+G:v1JiSoEGAlVpEqXnbsvcnI
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2084 winrm.exe 2084 winrm.exe 2084 winrm.exe 2084 winrm.exe 2084 winrm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2084 winrm.exe Token: SeDebugPrivilege 2084 winrm.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2084 winrm.exe 2084 winrm.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1656 2084 winrm.exe 28 PID 2084 wrote to memory of 1656 2084 winrm.exe 28 PID 2084 wrote to memory of 1656 2084 winrm.exe 28 PID 1656 wrote to memory of 2928 1656 cmd.exe 30 PID 1656 wrote to memory of 2928 1656 cmd.exe 30 PID 1656 wrote to memory of 2928 1656 cmd.exe 30 PID 1656 wrote to memory of 2480 1656 cmd.exe 31 PID 1656 wrote to memory of 2480 1656 cmd.exe 31 PID 1656 wrote to memory of 2480 1656 cmd.exe 31 PID 2928 wrote to memory of 2940 2928 net.exe 32 PID 2928 wrote to memory of 2940 2928 net.exe 32 PID 2928 wrote to memory of 2940 2928 net.exe 32 PID 2084 wrote to memory of 2540 2084 winrm.exe 33 PID 2084 wrote to memory of 2540 2084 winrm.exe 33 PID 2084 wrote to memory of 2540 2084 winrm.exe 33 PID 2540 wrote to memory of 2776 2540 cmd.exe 35 PID 2540 wrote to memory of 2776 2540 cmd.exe 35 PID 2540 wrote to memory of 2776 2540 cmd.exe 35 PID 2776 wrote to memory of 2396 2776 net.exe 36 PID 2776 wrote to memory of 2396 2776 net.exe 36 PID 2776 wrote to memory of 2396 2776 net.exe 36 PID 2084 wrote to memory of 2452 2084 winrm.exe 39 PID 2084 wrote to memory of 2452 2084 winrm.exe 39 PID 2084 wrote to memory of 2452 2084 winrm.exe 39 PID 2452 wrote to memory of 1732 2452 cmd.exe 41 PID 2452 wrote to memory of 1732 2452 cmd.exe 41 PID 2452 wrote to memory of 1732 2452 cmd.exe 41 PID 1732 wrote to memory of 2860 1732 net.exe 42 PID 1732 wrote to memory of 2860 1732 net.exe 42 PID 1732 wrote to memory of 2860 1732 net.exe 42 PID 2084 wrote to memory of 1972 2084 winrm.exe 43 PID 2084 wrote to memory of 1972 2084 winrm.exe 43 PID 2084 wrote to memory of 1972 2084 winrm.exe 43 PID 2084 wrote to memory of 2168 2084 winrm.exe 45 PID 2084 wrote to memory of 2168 2084 winrm.exe 45 PID 2084 wrote to memory of 2168 2084 winrm.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrm.exe"C:\Users\Admin\AppData\Local\Temp\winrm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\cmd.exe"cmd.exe" /c net localgroup "Administrators" | find "Admin"2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\net.exenet localgroup "Administrators"3⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators"4⤵PID:2940
-
-
-
C:\Windows\system32\find.exefind "Admin"3⤵PID:2480
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c net user Admin2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\net.exenet user Admin3⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin4⤵PID:2396
-
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c net user Admin admin152⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\net.exenet user Admin admin153⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin admin154⤵PID:2860
-
-
-
-
C:\Windows\system32\reg.exe"reg.exe" save HKLM\sam .\sam.reg2⤵PID:1972
-
-
C:\Windows\system32\reg.exe"reg.exe" save HKLM\system .\system.reg2⤵PID:2168
-