Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 07:14
Behavioral task
behavioral1
Sample
X.exe
Resource
win11-20241007-en
windows11-21h2-x64
6 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
X.exe
-
Size
102KB
-
MD5
d89f31f22563eb0fdf3828f4df78ed4f
-
SHA1
7a2a4c411831ebc8a474a68caa810117545f6a0e
-
SHA256
72ea0305c64249657bc7be7ffefe6403a74f6bed8c90ef191b7f04d7175d9c8f
-
SHA512
29826d851433b8603e923bc81da066662f6bb107564feb8e1ae9bb344138c2ab4ec7157595aefcec248feb1caa51285293dae927f2ab66b60b7bd8a17e2a2569
-
SSDEEP
1536:T/LHGj7cvtORUxy6rlp65LkgZqARZW7wIUg9rF0ZzV0imYFU47o9Tuui:7LHCcvMRUc6JcsA677sZ6vYFx7oZo
Score
8/10
Malware Config
Signatures
-
Possible privilege escalation attempt 4 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exepid Process 2196 icacls.exe 4236 takeown.exe 4424 icacls.exe 1060 takeown.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exepid Process 2196 icacls.exe 4236 takeown.exe 4424 icacls.exe 1060 takeown.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
X.exedescription ioc Process File opened for modification \??\PhysicalDrive0 X.exe -
Processes:
resource yara_rule behavioral1/memory/4192-0-0x00007FF7E8760000-0x00007FF7E8791000-memory.dmp upx behavioral1/memory/4192-2-0x00007FF7E8760000-0x00007FF7E8791000-memory.dmp upx -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 3396 taskkill.exe 1160 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
X.exedescription pid Process procid_target PID 4192 wrote to memory of 3384 4192 X.exe 80 PID 4192 wrote to memory of 3384 4192 X.exe 80 PID 4192 wrote to memory of 1060 4192 X.exe 81 PID 4192 wrote to memory of 1060 4192 X.exe 81 PID 4192 wrote to memory of 4424 4192 X.exe 82 PID 4192 wrote to memory of 4424 4192 X.exe 82 PID 4192 wrote to memory of 4236 4192 X.exe 83 PID 4192 wrote to memory of 4236 4192 X.exe 83 PID 4192 wrote to memory of 2196 4192 X.exe 84 PID 4192 wrote to memory of 2196 4192 X.exe 84 PID 4192 wrote to memory of 1160 4192 X.exe 85 PID 4192 wrote to memory of 1160 4192 X.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SYSTEM32\manage-bde.exemanage-bde -on C: -EncryptionMethod AES-2562⤵PID:3384
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f D:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1060
-
-
C:\Windows\SYSTEM32\icacls.exeicacls D:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4424
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f C:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4236
-
-
C:\Windows\SYSTEM32\icacls.exeicacls C:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2196
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM LsaIso.exe2⤵
- Kills process with taskkill
PID:1160
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM svchost.exe2⤵
- Kills process with taskkill
PID:3396
-