Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
Resource
win10v2004-20240709-en
asyncratstormkittyxwormdefaultevasionexecutionpersistenceprivilege_escalationratspywarestealertrojan
windows10-2004-x64
26 signatures
150 seconds
General
-
Target
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
-
Size
672KB
-
MD5
33d64072e513e7945f6585d19a3ba998
-
SHA1
4b790623eb16328d8fb76adf4e32b43cbbaf85f8
-
SHA256
6057667756c5dbd4b66e7d856e1d045d3a05b8592cc689a7eb5a548cd0c1be4e
-
SHA512
761a0499955f2d207ff386282f7e955ab4eb3892039e73e77a92f560ed05ac267e301b55ff80bec108db502fa428154af582b7a6b456f0a9975c42d9ab98e0e5
-
SSDEEP
3072:ZUGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:ZUGiVNEn14IZVvisL43
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
pid Process 2484 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2484 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2484 powershell.exe Token: SeIncreaseQuotaPrivilege 2652 WMIC.exe Token: SeSecurityPrivilege 2652 WMIC.exe Token: SeTakeOwnershipPrivilege 2652 WMIC.exe Token: SeLoadDriverPrivilege 2652 WMIC.exe Token: SeSystemProfilePrivilege 2652 WMIC.exe Token: SeSystemtimePrivilege 2652 WMIC.exe Token: SeProfSingleProcessPrivilege 2652 WMIC.exe Token: SeIncBasePriorityPrivilege 2652 WMIC.exe Token: SeCreatePagefilePrivilege 2652 WMIC.exe Token: SeBackupPrivilege 2652 WMIC.exe Token: SeRestorePrivilege 2652 WMIC.exe Token: SeShutdownPrivilege 2652 WMIC.exe Token: SeDebugPrivilege 2652 WMIC.exe Token: SeSystemEnvironmentPrivilege 2652 WMIC.exe Token: SeRemoteShutdownPrivilege 2652 WMIC.exe Token: SeUndockPrivilege 2652 WMIC.exe Token: SeManageVolumePrivilege 2652 WMIC.exe Token: 33 2652 WMIC.exe Token: 34 2652 WMIC.exe Token: 35 2652 WMIC.exe Token: SeIncreaseQuotaPrivilege 2652 WMIC.exe Token: SeSecurityPrivilege 2652 WMIC.exe Token: SeTakeOwnershipPrivilege 2652 WMIC.exe Token: SeLoadDriverPrivilege 2652 WMIC.exe Token: SeSystemProfilePrivilege 2652 WMIC.exe Token: SeSystemtimePrivilege 2652 WMIC.exe Token: SeProfSingleProcessPrivilege 2652 WMIC.exe Token: SeIncBasePriorityPrivilege 2652 WMIC.exe Token: SeCreatePagefilePrivilege 2652 WMIC.exe Token: SeBackupPrivilege 2652 WMIC.exe Token: SeRestorePrivilege 2652 WMIC.exe Token: SeShutdownPrivilege 2652 WMIC.exe Token: SeDebugPrivilege 2652 WMIC.exe Token: SeSystemEnvironmentPrivilege 2652 WMIC.exe Token: SeRemoteShutdownPrivilege 2652 WMIC.exe Token: SeUndockPrivilege 2652 WMIC.exe Token: SeManageVolumePrivilege 2652 WMIC.exe Token: 33 2652 WMIC.exe Token: 34 2652 WMIC.exe Token: 35 2652 WMIC.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2132 2236 cmd.exe 32 PID 2236 wrote to memory of 2132 2236 cmd.exe 32 PID 2236 wrote to memory of 2132 2236 cmd.exe 32 PID 2236 wrote to memory of 1004 2236 cmd.exe 33 PID 2236 wrote to memory of 1004 2236 cmd.exe 33 PID 2236 wrote to memory of 1004 2236 cmd.exe 33 PID 2236 wrote to memory of 1700 2236 cmd.exe 34 PID 2236 wrote to memory of 1700 2236 cmd.exe 34 PID 2236 wrote to memory of 1700 2236 cmd.exe 34 PID 2236 wrote to memory of 2484 2236 cmd.exe 35 PID 2236 wrote to memory of 2484 2236 cmd.exe 35 PID 2236 wrote to memory of 2484 2236 cmd.exe 35 PID 2236 wrote to memory of 2912 2236 cmd.exe 38 PID 2236 wrote to memory of 2912 2236 cmd.exe 38 PID 2236 wrote to memory of 2912 2236 cmd.exe 38 PID 2236 wrote to memory of 2776 2236 cmd.exe 39 PID 2236 wrote to memory of 2776 2236 cmd.exe 39 PID 2236 wrote to memory of 2776 2236 cmd.exe 39 PID 2236 wrote to memory of 2904 2236 cmd.exe 40 PID 2236 wrote to memory of 2904 2236 cmd.exe 40 PID 2236 wrote to memory of 2904 2236 cmd.exe 40 PID 2904 wrote to memory of 2652 2904 cmd.exe 41 PID 2904 wrote to memory of 2652 2904 cmd.exe 41 PID 2904 wrote to memory of 2652 2904 cmd.exe 41 PID 2904 wrote to memory of 1692 2904 cmd.exe 42 PID 2904 wrote to memory of 1692 2904 cmd.exe 42 PID 2904 wrote to memory of 1692 2904 cmd.exe 42 PID 2236 wrote to memory of 2680 2236 cmd.exe 43 PID 2236 wrote to memory of 2680 2236 cmd.exe 43 PID 2236 wrote to memory of 2680 2236 cmd.exe 43
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\EXM_Premium_Tweaking_Utility_1.0_Cracked.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:2132
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:1004
-
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:1700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\system32\reg.exeReg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f2⤵
- UAC bypass
PID:2912
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:2776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_UserAccount where name="Admin" get sid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\system32\findstr.exefindstr "S-"3⤵PID:1692
-
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2680
-