Analysis
-
max time kernel
104s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
Flarenew.exe
Resource
win10v2004-20250314-en
General
-
Target
Flarenew.exe
-
Size
91KB
-
MD5
417d59e4b342431a6995d71957b06f28
-
SHA1
6b5503229398752a8b40af7515ca6dd00768d153
-
SHA256
5e8d75ee062d71cd88fbb770398ad01232e13850b5ceb565452247c95cc3dd98
-
SHA512
884ecb113ef000f06c7a815536b03c982472b202bd3d65db05d7f45aba4d406dc9bcda8443838c26e8ce68fb8f451ef87e75fbfba003968c6a3418bb9f0a7e9f
-
SSDEEP
1536:j7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfhwScrHOR:/7DhdC6kzWypvaQ0FxyNTBfhRcri
Malware Config
Signatures
-
Possible privilege escalation attempt 16 IoCs
pid Process 2912 takeown.exe 4380 icacls.exe 4460 icacls.exe 4420 icacls.exe 1276 icacls.exe 3388 icacls.exe 4516 icacls.exe 4680 icacls.exe 5052 icacls.exe 1152 icacls.exe 3912 icacls.exe 1032 icacls.exe 2432 takeown.exe 3392 icacls.exe 4496 icacls.exe 4540 icacls.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 864 attrib.exe 3868 attrib.exe -
Modifies file permissions 1 TTPs 16 IoCs
pid Process 4420 icacls.exe 1276 icacls.exe 5052 icacls.exe 1032 icacls.exe 4380 icacls.exe 4680 icacls.exe 2432 takeown.exe 3388 icacls.exe 3912 icacls.exe 3392 icacls.exe 4516 icacls.exe 2912 takeown.exe 4496 icacls.exe 4460 icacls.exe 4540 icacls.exe 1152 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Update = "C:\\Windows\\System32\\flare.bat" reg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat attrib.exe File created C:\Windows\System32\flare_helper.bat cmd.exe File opened for modification C:\Windows\System32\flare_helper.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flarenew.exe -
Kills process with taskkill 1 IoCs
pid Process 3804 taskkill.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4432 notepad.exe 3500 notepad.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3804 taskkill.exe Token: SeTakeOwnershipPrivilege 2432 takeown.exe Token: SeTakeOwnershipPrivilege 2912 takeown.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2024 1540 Flarenew.exe 87 PID 1540 wrote to memory of 2024 1540 Flarenew.exe 87 PID 2024 wrote to memory of 2836 2024 cmd.exe 88 PID 2024 wrote to memory of 2836 2024 cmd.exe 88 PID 2024 wrote to memory of 5536 2024 cmd.exe 89 PID 2024 wrote to memory of 5536 2024 cmd.exe 89 PID 5536 wrote to memory of 1864 5536 net.exe 90 PID 5536 wrote to memory of 1864 5536 net.exe 90 PID 2024 wrote to memory of 3804 2024 cmd.exe 91 PID 2024 wrote to memory of 3804 2024 cmd.exe 91 PID 2024 wrote to memory of 2432 2024 cmd.exe 94 PID 2024 wrote to memory of 2432 2024 cmd.exe 94 PID 2024 wrote to memory of 2912 2024 cmd.exe 95 PID 2024 wrote to memory of 2912 2024 cmd.exe 95 PID 2024 wrote to memory of 3388 2024 cmd.exe 96 PID 2024 wrote to memory of 3388 2024 cmd.exe 96 PID 2024 wrote to memory of 3912 2024 cmd.exe 97 PID 2024 wrote to memory of 3912 2024 cmd.exe 97 PID 2024 wrote to memory of 864 2024 cmd.exe 99 PID 2024 wrote to memory of 864 2024 cmd.exe 99 PID 2024 wrote to memory of 1032 2024 cmd.exe 100 PID 2024 wrote to memory of 1032 2024 cmd.exe 100 PID 2024 wrote to memory of 3392 2024 cmd.exe 101 PID 2024 wrote to memory of 3392 2024 cmd.exe 101 PID 2024 wrote to memory of 4380 2024 cmd.exe 102 PID 2024 wrote to memory of 4380 2024 cmd.exe 102 PID 2024 wrote to memory of 4364 2024 cmd.exe 103 PID 2024 wrote to memory of 4364 2024 cmd.exe 103 PID 2024 wrote to memory of 4412 2024 cmd.exe 104 PID 2024 wrote to memory of 4412 2024 cmd.exe 104 PID 2024 wrote to memory of 4432 2024 cmd.exe 105 PID 2024 wrote to memory of 4432 2024 cmd.exe 105 PID 2024 wrote to memory of 4496 2024 cmd.exe 106 PID 2024 wrote to memory of 4496 2024 cmd.exe 106 PID 2024 wrote to memory of 4516 2024 cmd.exe 107 PID 2024 wrote to memory of 4516 2024 cmd.exe 107 PID 2024 wrote to memory of 4680 2024 cmd.exe 108 PID 2024 wrote to memory of 4680 2024 cmd.exe 108 PID 2024 wrote to memory of 4460 2024 cmd.exe 109 PID 2024 wrote to memory of 4460 2024 cmd.exe 109 PID 2024 wrote to memory of 4540 2024 cmd.exe 110 PID 2024 wrote to memory of 4540 2024 cmd.exe 110 PID 2024 wrote to memory of 4420 2024 cmd.exe 111 PID 2024 wrote to memory of 4420 2024 cmd.exe 111 PID 2024 wrote to memory of 5052 2024 cmd.exe 112 PID 2024 wrote to memory of 5052 2024 cmd.exe 112 PID 2024 wrote to memory of 1276 2024 cmd.exe 113 PID 2024 wrote to memory of 1276 2024 cmd.exe 113 PID 2024 wrote to memory of 1152 2024 cmd.exe 114 PID 2024 wrote to memory of 1152 2024 cmd.exe 114 PID 2024 wrote to memory of 3868 2024 cmd.exe 115 PID 2024 wrote to memory of 3868 2024 cmd.exe 115 PID 2024 wrote to memory of 3500 2024 cmd.exe 116 PID 2024 wrote to memory of 3500 2024 cmd.exe 116 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 864 attrib.exe 3868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\60CD.tmp\60CE.tmp\60CF.bat C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\msg.exemsg * "Fatal Error: You're not supposed to run this file."3⤵PID:2836
-
-
C:\Windows\system32\net.exenet session3⤵
- Suspicious use of WriteProcessMemory
PID:5536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:1864
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3388
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\SysWOW64\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3912
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Windows\System32\flare.bat"3⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:864
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Everyone:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1032
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny SYSTEM:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3392
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Administrators:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4380
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Security Update" /t REG_SZ /d "C:\Windows\System32\flare.bat" /f3⤵
- Adds Run key to start application
PID:4364
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:4412
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\flare_warning.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:4432
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\CON" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4496
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\PRN" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4516
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AUX" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4680
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\NUL" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4460
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM1" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4540
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM2" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4420
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM3" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5052
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT1" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1276
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT2" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1152
-
-
C:\Windows\system32\attrib.exeattrib +s +h "C:\Users\Admin\Desktop\LPT2"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3868
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\LPT2\lockfile.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:3500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD560b0fa85babe1b21db7fed64d3d12efc
SHA15e3016ddb412d50c6d85aec64f7d2efa9444ac94
SHA2563293710c28c45a67fc1d393524cfca28495ece81c4b0fcbabecc6bad1f1f1181
SHA5123404bca7e212fb2777448e2ae2ae8c3e7492e229673ea8b16325032836f3b47707c8404d2c8b0a1a4cc454d8aca031b029f863712747e5c8de34bccae4fb89cb
-
Filesize
16B
MD535519859078faf1bb9ff9aa6d97e02f7
SHA1f62fa3cba186ac4fc65321e5b24f3b3c6713e168
SHA256c76a191235beca08d9290c53f8832be67b1b9671269674ece289e3162157d2b1
SHA512674ed9c45e4070cd2de21e7a74fe8327ad3db7234a306988fd579e126f6c37ce5a39fa45cbf2da818c81bf7dfcf160f4f993f9fb3d3a85a1530101564ced9df9
-
Filesize
91KB
MD5417d59e4b342431a6995d71957b06f28
SHA16b5503229398752a8b40af7515ca6dd00768d153
SHA2565e8d75ee062d71cd88fbb770398ad01232e13850b5ceb565452247c95cc3dd98
SHA512884ecb113ef000f06c7a815536b03c982472b202bd3d65db05d7f45aba4d406dc9bcda8443838c26e8ce68fb8f451ef87e75fbfba003968c6a3418bb9f0a7e9f