Resubmissions
30-05-2024 10:57
240530-m2a24sfg76 10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
-
Size
672KB
-
MD5
f9ca73d63fe61c4c401528fb470ce08e
-
SHA1
584f69b507ddf33985673ee612e6099aff760fb1
-
SHA256
16431cc14917abeb316e0bc44045440a8f86b7ac4fdd0dce99de6435d493ecca
-
SHA512
6fd03320ec84baf09a16a127c2c0ed3c265906fcb1a3b807c13001e775c396b66539238392438a8f290be04b8b8684050736331f8f99dbe8b868b44f154dd9de
-
SSDEEP
3072:BIGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:BIGiVNEn14IZVvisL43
Malware Config
Signatures
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
powershell.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2076 powershell.exe Token: SeIncreaseQuotaPrivilege 2736 WMIC.exe Token: SeSecurityPrivilege 2736 WMIC.exe Token: SeTakeOwnershipPrivilege 2736 WMIC.exe Token: SeLoadDriverPrivilege 2736 WMIC.exe Token: SeSystemProfilePrivilege 2736 WMIC.exe Token: SeSystemtimePrivilege 2736 WMIC.exe Token: SeProfSingleProcessPrivilege 2736 WMIC.exe Token: SeIncBasePriorityPrivilege 2736 WMIC.exe Token: SeCreatePagefilePrivilege 2736 WMIC.exe Token: SeBackupPrivilege 2736 WMIC.exe Token: SeRestorePrivilege 2736 WMIC.exe Token: SeShutdownPrivilege 2736 WMIC.exe Token: SeDebugPrivilege 2736 WMIC.exe Token: SeSystemEnvironmentPrivilege 2736 WMIC.exe Token: SeRemoteShutdownPrivilege 2736 WMIC.exe Token: SeUndockPrivilege 2736 WMIC.exe Token: SeManageVolumePrivilege 2736 WMIC.exe Token: 33 2736 WMIC.exe Token: 34 2736 WMIC.exe Token: 35 2736 WMIC.exe Token: SeIncreaseQuotaPrivilege 2736 WMIC.exe Token: SeSecurityPrivilege 2736 WMIC.exe Token: SeTakeOwnershipPrivilege 2736 WMIC.exe Token: SeLoadDriverPrivilege 2736 WMIC.exe Token: SeSystemProfilePrivilege 2736 WMIC.exe Token: SeSystemtimePrivilege 2736 WMIC.exe Token: SeProfSingleProcessPrivilege 2736 WMIC.exe Token: SeIncBasePriorityPrivilege 2736 WMIC.exe Token: SeCreatePagefilePrivilege 2736 WMIC.exe Token: SeBackupPrivilege 2736 WMIC.exe Token: SeRestorePrivilege 2736 WMIC.exe Token: SeShutdownPrivilege 2736 WMIC.exe Token: SeDebugPrivilege 2736 WMIC.exe Token: SeSystemEnvironmentPrivilege 2736 WMIC.exe Token: SeRemoteShutdownPrivilege 2736 WMIC.exe Token: SeUndockPrivilege 2736 WMIC.exe Token: SeManageVolumePrivilege 2736 WMIC.exe Token: 33 2736 WMIC.exe Token: 34 2736 WMIC.exe Token: 35 2736 WMIC.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 1952 wrote to memory of 2388 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2388 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2388 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2192 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2192 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2192 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2420 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2420 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2420 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2076 1952 cmd.exe powershell.exe PID 1952 wrote to memory of 2076 1952 cmd.exe powershell.exe PID 1952 wrote to memory of 2076 1952 cmd.exe powershell.exe PID 1952 wrote to memory of 2496 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2496 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2496 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2548 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2548 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2548 1952 cmd.exe reg.exe PID 1952 wrote to memory of 2488 1952 cmd.exe cmd.exe PID 1952 wrote to memory of 2488 1952 cmd.exe cmd.exe PID 1952 wrote to memory of 2488 1952 cmd.exe cmd.exe PID 2488 wrote to memory of 2736 2488 cmd.exe WMIC.exe PID 2488 wrote to memory of 2736 2488 cmd.exe WMIC.exe PID 2488 wrote to memory of 2736 2488 cmd.exe WMIC.exe PID 2488 wrote to memory of 3024 2488 cmd.exe findstr.exe PID 2488 wrote to memory of 3024 2488 cmd.exe findstr.exe PID 2488 wrote to memory of 3024 2488 cmd.exe findstr.exe PID 1952 wrote to memory of 2516 1952 cmd.exe chcp.com PID 1952 wrote to memory of 2516 1952 cmd.exe chcp.com PID 1952 wrote to memory of 2516 1952 cmd.exe chcp.com
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\EXM_Premium_Tweaking_Utility_1.0_Cracked.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:2388
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:2192
-
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:2420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\system32\reg.exeReg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f2⤵
- UAC bypass
PID:2496
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:2548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_UserAccount where name="Admin" get sid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\findstr.exefindstr "S-"3⤵PID:3024
-
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2516
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2580