Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 09:21
Behavioral task
behavioral1
Sample
X.exe
Resource
win11-20241023-en
windows11-21h2-x64
6 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
X.exe
-
Size
102KB
-
MD5
ee9f2554cdcbd39e2b39962f1e7afe36
-
SHA1
a987a60fceec3b3e1bc14b5dcb7a8985af9bf61d
-
SHA256
f3b4bae7a22377555872f096b9ec176220734206d932e34d0e00ab43aa7086e8
-
SHA512
977ce766a806f81ac80e398810da229ca03992e270cc5d7fa258ac266d5bf6968b330354dfb29b8d5bc29927e54e0662878a44f523561590500880c36835fb68
-
SSDEEP
1536:985VEH2aNU2o5DX776Nc8mSsQWUYXtJWi/t23z52s0imYFU47o9Tuui:9sE2aNU2WDX7+NEUri42vYFx7oZo
Score
8/10
Malware Config
Signatures
-
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid Process 2140 takeown.exe 3456 icacls.exe 4656 takeown.exe 4992 icacls.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid Process 2140 takeown.exe 3456 icacls.exe 4656 takeown.exe 4992 icacls.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
X.exedescription ioc Process File opened for modification \??\PhysicalDrive0 X.exe -
Processes:
resource yara_rule behavioral1/memory/1676-0-0x00007FF7F3E60000-0x00007FF7F3E91000-memory.dmp upx -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 1248 taskkill.exe 3408 taskkill.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
X.exedescription pid Process procid_target PID 1676 wrote to memory of 3448 1676 X.exe 80 PID 1676 wrote to memory of 3448 1676 X.exe 80 PID 1676 wrote to memory of 2140 1676 X.exe 81 PID 1676 wrote to memory of 2140 1676 X.exe 81 PID 1676 wrote to memory of 4992 1676 X.exe 82 PID 1676 wrote to memory of 4992 1676 X.exe 82 PID 1676 wrote to memory of 4656 1676 X.exe 83 PID 1676 wrote to memory of 4656 1676 X.exe 83 PID 1676 wrote to memory of 3456 1676 X.exe 84 PID 1676 wrote to memory of 3456 1676 X.exe 84 PID 1676 wrote to memory of 3408 1676 X.exe 85 PID 1676 wrote to memory of 3408 1676 X.exe 85 PID 1676 wrote to memory of 1248 1676 X.exe 86 PID 1676 wrote to memory of 1248 1676 X.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SYSTEM32\manage-bde.exemanage-bde -on C: -EncryptionMethod AES-2562⤵PID:3448
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f D:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2140
-
-
C:\Windows\SYSTEM32\icacls.exeicacls D:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4992
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f C:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4656
-
-
C:\Windows\SYSTEM32\icacls.exeicacls C:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3456
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM LsaIso.exe2⤵
- Kills process with taskkill
PID:3408
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM svchost.exe2⤵
- Kills process with taskkill
PID:1248
-