Analysis
-
max time kernel
43s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
EXMPremiumTweaker.bat
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
EXMPremiumTweaker.bat
-
Size
669KB
-
MD5
a907bfcab8903b37d8595377c3e268ed
-
SHA1
e521540a3bffd5567d83782628b3de6173cb9364
-
SHA256
12d8bccc8b4bf05902c0b015095db69b07dd859b577e9aa806201a082a8244ee
-
SHA512
bb122cd94abfe6b43b2bd86852b37212b0d6096385bad85fea47d0aa3d80ada43c8e62735db1a5561c25ad9c23a4f8681933197dcf0495e1b182061181650905
-
SSDEEP
3072:WDGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:WDGiVNEn14IZVvisL43
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
pid Process 1300 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1300 powershell.exe Token: SeIncreaseQuotaPrivilege 2468 WMIC.exe Token: SeSecurityPrivilege 2468 WMIC.exe Token: SeTakeOwnershipPrivilege 2468 WMIC.exe Token: SeLoadDriverPrivilege 2468 WMIC.exe Token: SeSystemProfilePrivilege 2468 WMIC.exe Token: SeSystemtimePrivilege 2468 WMIC.exe Token: SeProfSingleProcessPrivilege 2468 WMIC.exe Token: SeIncBasePriorityPrivilege 2468 WMIC.exe Token: SeCreatePagefilePrivilege 2468 WMIC.exe Token: SeBackupPrivilege 2468 WMIC.exe Token: SeRestorePrivilege 2468 WMIC.exe Token: SeShutdownPrivilege 2468 WMIC.exe Token: SeDebugPrivilege 2468 WMIC.exe Token: SeSystemEnvironmentPrivilege 2468 WMIC.exe Token: SeRemoteShutdownPrivilege 2468 WMIC.exe Token: SeUndockPrivilege 2468 WMIC.exe Token: SeManageVolumePrivilege 2468 WMIC.exe Token: 33 2468 WMIC.exe Token: 34 2468 WMIC.exe Token: 35 2468 WMIC.exe Token: SeIncreaseQuotaPrivilege 2468 WMIC.exe Token: SeSecurityPrivilege 2468 WMIC.exe Token: SeTakeOwnershipPrivilege 2468 WMIC.exe Token: SeLoadDriverPrivilege 2468 WMIC.exe Token: SeSystemProfilePrivilege 2468 WMIC.exe Token: SeSystemtimePrivilege 2468 WMIC.exe Token: SeProfSingleProcessPrivilege 2468 WMIC.exe Token: SeIncBasePriorityPrivilege 2468 WMIC.exe Token: SeCreatePagefilePrivilege 2468 WMIC.exe Token: SeBackupPrivilege 2468 WMIC.exe Token: SeRestorePrivilege 2468 WMIC.exe Token: SeShutdownPrivilege 2468 WMIC.exe Token: SeDebugPrivilege 2468 WMIC.exe Token: SeSystemEnvironmentPrivilege 2468 WMIC.exe Token: SeRemoteShutdownPrivilege 2468 WMIC.exe Token: SeUndockPrivilege 2468 WMIC.exe Token: SeManageVolumePrivilege 2468 WMIC.exe Token: 33 2468 WMIC.exe Token: 34 2468 WMIC.exe Token: 35 2468 WMIC.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1068 2760 cmd.exe 29 PID 2760 wrote to memory of 1068 2760 cmd.exe 29 PID 2760 wrote to memory of 1068 2760 cmd.exe 29 PID 2760 wrote to memory of 2368 2760 cmd.exe 30 PID 2760 wrote to memory of 2368 2760 cmd.exe 30 PID 2760 wrote to memory of 2368 2760 cmd.exe 30 PID 2760 wrote to memory of 2212 2760 cmd.exe 31 PID 2760 wrote to memory of 2212 2760 cmd.exe 31 PID 2760 wrote to memory of 2212 2760 cmd.exe 31 PID 2760 wrote to memory of 1300 2760 cmd.exe 32 PID 2760 wrote to memory of 1300 2760 cmd.exe 32 PID 2760 wrote to memory of 1300 2760 cmd.exe 32 PID 2760 wrote to memory of 2628 2760 cmd.exe 35 PID 2760 wrote to memory of 2628 2760 cmd.exe 35 PID 2760 wrote to memory of 2628 2760 cmd.exe 35 PID 2760 wrote to memory of 2548 2760 cmd.exe 36 PID 2760 wrote to memory of 2548 2760 cmd.exe 36 PID 2760 wrote to memory of 2548 2760 cmd.exe 36 PID 2760 wrote to memory of 2592 2760 cmd.exe 37 PID 2760 wrote to memory of 2592 2760 cmd.exe 37 PID 2760 wrote to memory of 2592 2760 cmd.exe 37 PID 2592 wrote to memory of 2468 2592 cmd.exe 38 PID 2592 wrote to memory of 2468 2592 cmd.exe 38 PID 2592 wrote to memory of 2468 2592 cmd.exe 38 PID 2592 wrote to memory of 2652 2592 cmd.exe 39 PID 2592 wrote to memory of 2652 2592 cmd.exe 39 PID 2592 wrote to memory of 2652 2592 cmd.exe 39 PID 2760 wrote to memory of 2604 2760 cmd.exe 40 PID 2760 wrote to memory of 2604 2760 cmd.exe 40 PID 2760 wrote to memory of 2604 2760 cmd.exe 40
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\EXMPremiumTweaker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:1068
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:2368
-
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:2212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\system32\reg.exeReg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f2⤵
- UAC bypass
PID:2628
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:2548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"2⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_UserAccount where name="Admin" get sid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\system32\findstr.exefindstr "S-"3⤵PID:2652
-
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2604
-