Overview
overview
8Static
static
3Perm Unban...IN.exe
windows10-2004-x64
1Perm Unban...64.exe
windows10-2004-x64
1Perm Unban...16.exe
windows10-2004-x64
Perm Unban...IT.exe
windows10-2004-x64
1Perm Unban...LL.dll
windows10-2004-x64
3Perm Unban...YS.sys
windows10-2004-x64
1Perm Unban...64.sys
windows10-2004-x64
1Perm Unban...64.sys
windows10-2004-x64
1Perm Unban...sk.exe
windows10-2004-x64
6Perm Unban...ry.bat
windows10-2004-x64
1Perm Unban...ip.bat
windows10-2004-x64
8Perm Unban...ge.bat
windows10-2004-x64
1Analysis
-
max time kernel
33s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
Perm Unban/GRINX64v2/AMIDEWIN.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
Perm Unban/GRINX64v2/AMIDEWINx64.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Perm Unban/GRINX64v2/DMI16.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
Perm Unban/GRINX64v2/DMIEDIT.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Perm Unban/GRINX64v2/UCOREDLL.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
Perm Unban/GRINX64v2/UCORESYS.sys
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Perm Unban/GRINX64v2/UCOREW64.sys
Resource
win10v2004-20240704-en
Behavioral task
behavioral8
Sample
Perm Unban/GRINX64v2/amifldrv64.sys
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Perm Unban/HardDisk.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral10
Sample
Perm Unban/Registry.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
Perm Unban/Reset_ip.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral12
Sample
Perm Unban/regedit_change.bat
Resource
win10v2004-20240704-en
General
-
Target
Perm Unban/Reset_ip.bat
-
Size
436B
-
MD5
8175e46feb5b12012c3780de248d2e72
-
SHA1
c79e4373554a9c397c611b6bad04b5743ca53a3d
-
SHA256
a11555e1ab7e92eee837f6778cdd41928a13efdc21f8b788abcacbe7bc511255
-
SHA512
9dea656e6f36bad77dc1db32d73fb58559447fcc5a67290a2809930540086ee042693e643dea1be4cff4ec6345e0209d99ae840aaa1468a5b2d7fb1a3bb8fff5
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4496 netsh.exe 5040 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 33 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
pid Process 3604 ipconfig.exe 3660 ipconfig.exe 1964 ipconfig.exe 2572 ipconfig.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1400 wrote to memory of 3144 1400 cmd.exe 83 PID 1400 wrote to memory of 3144 1400 cmd.exe 83 PID 1400 wrote to memory of 1136 1400 cmd.exe 87 PID 1400 wrote to memory of 1136 1400 cmd.exe 87 PID 1400 wrote to memory of 3412 1400 cmd.exe 88 PID 1400 wrote to memory of 3412 1400 cmd.exe 88 PID 1400 wrote to memory of 2168 1400 cmd.exe 90 PID 1400 wrote to memory of 2168 1400 cmd.exe 90 PID 1400 wrote to memory of 3048 1400 cmd.exe 91 PID 1400 wrote to memory of 3048 1400 cmd.exe 91 PID 1400 wrote to memory of 4776 1400 cmd.exe 92 PID 1400 wrote to memory of 4776 1400 cmd.exe 92 PID 1400 wrote to memory of 264 1400 cmd.exe 93 PID 1400 wrote to memory of 264 1400 cmd.exe 93 PID 1400 wrote to memory of 3604 1400 cmd.exe 94 PID 1400 wrote to memory of 3604 1400 cmd.exe 94 PID 1400 wrote to memory of 3660 1400 cmd.exe 95 PID 1400 wrote to memory of 3660 1400 cmd.exe 95 PID 1400 wrote to memory of 1964 1400 cmd.exe 96 PID 1400 wrote to memory of 1964 1400 cmd.exe 96 PID 1400 wrote to memory of 2572 1400 cmd.exe 97 PID 1400 wrote to memory of 2572 1400 cmd.exe 97 PID 1400 wrote to memory of 4496 1400 cmd.exe 98 PID 1400 wrote to memory of 4496 1400 cmd.exe 98 PID 1400 wrote to memory of 3744 1400 cmd.exe 99 PID 1400 wrote to memory of 3744 1400 cmd.exe 99 PID 1400 wrote to memory of 4708 1400 cmd.exe 100 PID 1400 wrote to memory of 4708 1400 cmd.exe 100 PID 1400 wrote to memory of 2116 1400 cmd.exe 101 PID 1400 wrote to memory of 2116 1400 cmd.exe 101 PID 1400 wrote to memory of 5040 1400 cmd.exe 102 PID 1400 wrote to memory of 5040 1400 cmd.exe 102
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Perm Unban\Reset_ip.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\netsh.exenetsh int ip set address "%j" dhcp2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3144
-
-
C:\Windows\system32\netsh.exenetsh int ip set dns "%j" dhcp2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1136
-
-
C:\Windows\system32\netsh.exenetsh interface set interface name="%j" admin=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3412
-
-
C:\Windows\system32\certutil.execertutil -URLCache * delete2⤵PID:2168
-
-
C:\Windows\system32\netsh.exenetsh int ip reset2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3048
-
-
C:\Windows\system32\netsh.exenetsh int ipv4 reset2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4776
-
-
C:\Windows\system32\netsh.exenetsh int ipv6 reset2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:264
-
-
C:\Windows\system32\ipconfig.exeipconfig /2⤵
- Gathers network information
PID:3604
-
-
C:\Windows\system32\ipconfig.exeipconfig /release2⤵
- Gathers network information
PID:3660
-
-
C:\Windows\system32\ipconfig.exeipconfig /renew2⤵
- Gathers network information
PID:1964
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:2572
-
-
C:\Windows\system32\netsh.exenetsh advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4496
-
-
C:\Windows\system32\netsh.exenetsh winsock reset2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3744
-
-
C:\Windows\system32\netsh.exenetsh int ip reset2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4708
-
-
C:\Windows\system32\netsh.exenetsh winsock reset2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2116
-
-
C:\Windows\system32\netsh.exenetsh advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5040
-