Analysis
-
max time kernel
316s -
max time network
317s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
run.ps1
Resource
win7-20240708-en
windows7-x64
7 signatures
150 seconds
General
-
Target
run.ps1
-
Size
1B
-
MD5
7215ee9c7d9dc229d2921a40e899ec5f
-
SHA1
b858cb282617fb0956d960215c8e84d1ccf909c6
-
SHA256
36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068
-
SHA512
f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768
Malware Config
Signatures
-
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 2612 takeown.exe 2552 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 2612 takeown.exe 2552 icacls.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2620 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exetakeown.exedescription pid process Token: SeDebugPrivilege 1744 powershell.exe Token: SeTakeOwnershipPrivilege 2612 takeown.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exedescription pid process target process PID 1596 wrote to memory of 2612 1596 cmd.exe takeown.exe PID 1596 wrote to memory of 2612 1596 cmd.exe takeown.exe PID 1596 wrote to memory of 2612 1596 cmd.exe takeown.exe PID 1596 wrote to memory of 2552 1596 cmd.exe icacls.exe PID 1596 wrote to memory of 2552 1596 cmd.exe icacls.exe PID 1596 wrote to memory of 2552 1596 cmd.exe icacls.exe PID 1596 wrote to memory of 2620 1596 cmd.exe taskkill.exe PID 1596 wrote to memory of 2620 1596 cmd.exe taskkill.exe PID 1596 wrote to memory of 2620 1596 cmd.exe taskkill.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\run.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2820
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\takeown.exetakeown /f wininit.exe2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Windows\System32\icacls.exeicacls wininit.exe /grant everyone:(f)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2552 -
C:\Windows\System32\taskkill.exetaskkill wininit.exe2⤵
- Kills process with taskkill
PID:2620