Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
Flarenew.exe
Resource
win10v2004-20250314-en
General
-
Target
Flarenew.exe
-
Size
91KB
-
MD5
6895b0fdc7ee57d6cdb403fde6fcca61
-
SHA1
38d38e0cb1baa03a1c67e694fe61f32a273d2476
-
SHA256
2763c137488f401f90fd45a1a1e0d53a7c83690fae184c6c5fd1d6a0441fc812
-
SHA512
66f734e0da1319026d2e170cca16f2845412c6abcae017da652ff0354494372d3207ba3e94f3c9f429594daea3add4f292f9268aecac09b71210ef67ae1e628a
-
SSDEEP
1536:D7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIf6wq4Od:f7DhdC6kzWypvaQ0FxyNTBf6Fx
Malware Config
Signatures
-
Possible privilege escalation attempt 7 IoCs
pid Process 2792 icacls.exe 224 icacls.exe 2372 icacls.exe 4688 icacls.exe 3156 takeown.exe 3596 takeown.exe 2280 icacls.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 512 attrib.exe -
Modifies file permissions 1 TTPs 7 IoCs
pid Process 2372 icacls.exe 4688 icacls.exe 3156 takeown.exe 3596 takeown.exe 2280 icacls.exe 2792 icacls.exe 224 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Update = "C:\\Windows\\System32\\flare.bat" reg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat attrib.exe File created C:\Windows\System32\flare_helper.bat cmd.exe File opened for modification C:\Windows\System32\flare_helper.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flarenew.exe -
Kills process with taskkill 1 IoCs
pid Process 2672 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2672 taskkill.exe Token: SeTakeOwnershipPrivilege 3156 takeown.exe Token: SeTakeOwnershipPrivilege 3596 takeown.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4620 wrote to memory of 2412 4620 Flarenew.exe 88 PID 4620 wrote to memory of 2412 4620 Flarenew.exe 88 PID 2412 wrote to memory of 324 2412 cmd.exe 89 PID 2412 wrote to memory of 324 2412 cmd.exe 89 PID 2412 wrote to memory of 4296 2412 cmd.exe 90 PID 2412 wrote to memory of 4296 2412 cmd.exe 90 PID 4296 wrote to memory of 3776 4296 net.exe 91 PID 4296 wrote to memory of 3776 4296 net.exe 91 PID 2412 wrote to memory of 2672 2412 cmd.exe 92 PID 2412 wrote to memory of 2672 2412 cmd.exe 92 PID 2412 wrote to memory of 3156 2412 cmd.exe 94 PID 2412 wrote to memory of 3156 2412 cmd.exe 94 PID 2412 wrote to memory of 3596 2412 cmd.exe 95 PID 2412 wrote to memory of 3596 2412 cmd.exe 95 PID 2412 wrote to memory of 2280 2412 cmd.exe 96 PID 2412 wrote to memory of 2280 2412 cmd.exe 96 PID 2412 wrote to memory of 2792 2412 cmd.exe 97 PID 2412 wrote to memory of 2792 2412 cmd.exe 97 PID 2412 wrote to memory of 512 2412 cmd.exe 98 PID 2412 wrote to memory of 512 2412 cmd.exe 98 PID 2412 wrote to memory of 224 2412 cmd.exe 99 PID 2412 wrote to memory of 224 2412 cmd.exe 99 PID 2412 wrote to memory of 2372 2412 cmd.exe 100 PID 2412 wrote to memory of 2372 2412 cmd.exe 100 PID 2412 wrote to memory of 4688 2412 cmd.exe 101 PID 2412 wrote to memory of 4688 2412 cmd.exe 101 PID 2412 wrote to memory of 1976 2412 cmd.exe 102 PID 2412 wrote to memory of 1976 2412 cmd.exe 102 PID 2412 wrote to memory of 2184 2412 cmd.exe 103 PID 2412 wrote to memory of 2184 2412 cmd.exe 103 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 512 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8906.tmp\8907.tmp\8908.bat C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\msg.exemsg * "Fatal Error: Something unusual has occured. Maybe try restarting your PC?"3⤵PID:324
-
-
C:\Windows\system32\net.exenet session3⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:3776
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2280
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\SysWOW64\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2792
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Windows\System32\flare.bat"3⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:512
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Everyone:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:224
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny SYSTEM:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2372
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Administrators:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4688
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Security Update" /t REG_SZ /d "C:\Windows\System32\flare.bat" /f3⤵
- Adds Run key to start application
PID:1976
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5659da335d00865d3b3d471fb5a3f20ec
SHA1f2268458ba0fd0efaea875b0ab7e360c6634f24b
SHA256ed3331f8a9950119a9bb9a4172d0369c70bbd5cb1ffab046dca09078456f1e24
SHA5126aead76fd88b3cad9ca990e3100691619b212b3b5785851dc4f8ef243501b5b2deafcd587e802f3cffb9d0199c47317df9bd184caa8ddeca64e3e474d666fe7d
-
Filesize
91KB
MD56895b0fdc7ee57d6cdb403fde6fcca61
SHA138d38e0cb1baa03a1c67e694fe61f32a273d2476
SHA2562763c137488f401f90fd45a1a1e0d53a7c83690fae184c6c5fd1d6a0441fc812
SHA51266f734e0da1319026d2e170cca16f2845412c6abcae017da652ff0354494372d3207ba3e94f3c9f429594daea3add4f292f9268aecac09b71210ef67ae1e628a