Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 07:24
Behavioral task
behavioral1
Sample
X.exe
Resource
win11-20241007-en
windows11-21h2-x64
6 signatures
150 seconds
General
-
Target
X.exe
-
Size
102KB
-
MD5
ee9f2554cdcbd39e2b39962f1e7afe36
-
SHA1
a987a60fceec3b3e1bc14b5dcb7a8985af9bf61d
-
SHA256
f3b4bae7a22377555872f096b9ec176220734206d932e34d0e00ab43aa7086e8
-
SHA512
977ce766a806f81ac80e398810da229ca03992e270cc5d7fa258ac266d5bf6968b330354dfb29b8d5bc29927e54e0662878a44f523561590500880c36835fb68
-
SSDEEP
1536:985VEH2aNU2o5DX776Nc8mSsQWUYXtJWi/t23z52s0imYFU47o9Tuui:9sE2aNU2WDX7+NEUri42vYFx7oZo
Score
8/10
Malware Config
Signatures
-
Possible privilege escalation attempt 4 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exepid Process 3316 icacls.exe 4436 takeown.exe 3156 icacls.exe 5104 takeown.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid Process 5104 takeown.exe 3316 icacls.exe 4436 takeown.exe 3156 icacls.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
X.exedescription ioc Process File opened for modification \??\PhysicalDrive0 X.exe -
Processes:
resource yara_rule behavioral1/memory/2412-0-0x00007FF612360000-0x00007FF612391000-memory.dmp upx -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 4128 taskkill.exe 5040 taskkill.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
X.exedescription pid Process procid_target PID 2412 wrote to memory of 1316 2412 X.exe 80 PID 2412 wrote to memory of 1316 2412 X.exe 80 PID 2412 wrote to memory of 5104 2412 X.exe 81 PID 2412 wrote to memory of 5104 2412 X.exe 81 PID 2412 wrote to memory of 3156 2412 X.exe 82 PID 2412 wrote to memory of 3156 2412 X.exe 82 PID 2412 wrote to memory of 4436 2412 X.exe 83 PID 2412 wrote to memory of 4436 2412 X.exe 83 PID 2412 wrote to memory of 3316 2412 X.exe 84 PID 2412 wrote to memory of 3316 2412 X.exe 84 PID 2412 wrote to memory of 4128 2412 X.exe 85 PID 2412 wrote to memory of 4128 2412 X.exe 85 PID 2412 wrote to memory of 5040 2412 X.exe 86 PID 2412 wrote to memory of 5040 2412 X.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SYSTEM32\manage-bde.exemanage-bde -on C: -EncryptionMethod AES-2562⤵PID:1316
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f D:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5104
-
-
C:\Windows\SYSTEM32\icacls.exeicacls D:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3156
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f C:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4436
-
-
C:\Windows\SYSTEM32\icacls.exeicacls C:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3316
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM LsaIso.exe2⤵
- Kills process with taskkill
PID:4128
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM svchost.exe2⤵
- Kills process with taskkill
PID:5040
-