Analysis
-
max time kernel
12s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
Flarenew.exe
Resource
win10v2004-20250314-en
General
-
Target
Flarenew.exe
-
Size
91KB
-
MD5
1a137b783a1a39509329236672fe24cc
-
SHA1
f6ecd8fb3f52fe31c357b2c2a23a68aa0a0989a7
-
SHA256
99c985b3b072b5a1a793187cef71c494c6c4e9b963e77c0c3fcbaca46329c002
-
SHA512
a9a79f413df02f331177f3833424f48e29edf0f95dbffc0e9f03d5b371d92f60e41f00d12a9667a11e5ca9f80548b4d127fec11862e869b512ab938bdd1f3d72
-
SSDEEP
1536:L7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIf0wUEOE:H7DhdC6kzWypvaQ0FxyNTBf0n8
Malware Config
Signatures
-
Possible privilege escalation attempt 16 IoCs
pid Process 2536 icacls.exe 728 icacls.exe 4916 icacls.exe 4976 icacls.exe 3396 icacls.exe 3524 icacls.exe 2820 icacls.exe 2468 icacls.exe 1740 icacls.exe 3572 icacls.exe 3424 icacls.exe 4812 icacls.exe 4460 icacls.exe 2648 icacls.exe 1592 takeown.exe 768 takeown.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2708 attrib.exe 4832 attrib.exe -
Modifies file permissions 1 TTPs 16 IoCs
pid Process 2820 icacls.exe 2468 icacls.exe 3572 icacls.exe 4916 icacls.exe 3396 icacls.exe 3524 icacls.exe 2536 icacls.exe 2648 icacls.exe 728 icacls.exe 1592 takeown.exe 1740 icacls.exe 3424 icacls.exe 4812 icacls.exe 4976 icacls.exe 4460 icacls.exe 768 takeown.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Update = "C:\\Windows\\System32\\flare.bat" reg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\flare.bat attrib.exe File created C:\Windows\System32\flare_helper.bat cmd.exe File opened for modification C:\Windows\System32\flare_helper.bat cmd.exe File created C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flarenew.exe -
Kills process with taskkill 1 IoCs
pid Process 1336 taskkill.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 1988 notepad.exe 916 notepad.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1336 taskkill.exe Token: SeTakeOwnershipPrivilege 1592 takeown.exe Token: SeTakeOwnershipPrivilege 768 takeown.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1472 wrote to memory of 4720 1472 Flarenew.exe 90 PID 1472 wrote to memory of 4720 1472 Flarenew.exe 90 PID 4720 wrote to memory of 2964 4720 cmd.exe 91 PID 4720 wrote to memory of 2964 4720 cmd.exe 91 PID 4720 wrote to memory of 1820 4720 cmd.exe 92 PID 4720 wrote to memory of 1820 4720 cmd.exe 92 PID 1820 wrote to memory of 3000 1820 net.exe 93 PID 1820 wrote to memory of 3000 1820 net.exe 93 PID 4720 wrote to memory of 1336 4720 cmd.exe 94 PID 4720 wrote to memory of 1336 4720 cmd.exe 94 PID 4720 wrote to memory of 1592 4720 cmd.exe 96 PID 4720 wrote to memory of 1592 4720 cmd.exe 96 PID 4720 wrote to memory of 768 4720 cmd.exe 97 PID 4720 wrote to memory of 768 4720 cmd.exe 97 PID 4720 wrote to memory of 2468 4720 cmd.exe 98 PID 4720 wrote to memory of 2468 4720 cmd.exe 98 PID 4720 wrote to memory of 1740 4720 cmd.exe 99 PID 4720 wrote to memory of 1740 4720 cmd.exe 99 PID 4720 wrote to memory of 2708 4720 cmd.exe 100 PID 4720 wrote to memory of 2708 4720 cmd.exe 100 PID 4720 wrote to memory of 3572 4720 cmd.exe 101 PID 4720 wrote to memory of 3572 4720 cmd.exe 101 PID 4720 wrote to memory of 3424 4720 cmd.exe 102 PID 4720 wrote to memory of 3424 4720 cmd.exe 102 PID 4720 wrote to memory of 4916 4720 cmd.exe 103 PID 4720 wrote to memory of 4916 4720 cmd.exe 103 PID 4720 wrote to memory of 1548 4720 cmd.exe 104 PID 4720 wrote to memory of 1548 4720 cmd.exe 104 PID 4720 wrote to memory of 392 4720 cmd.exe 105 PID 4720 wrote to memory of 392 4720 cmd.exe 105 PID 4720 wrote to memory of 916 4720 cmd.exe 106 PID 4720 wrote to memory of 916 4720 cmd.exe 106 PID 4720 wrote to memory of 4812 4720 cmd.exe 107 PID 4720 wrote to memory of 4812 4720 cmd.exe 107 PID 4720 wrote to memory of 4976 4720 cmd.exe 108 PID 4720 wrote to memory of 4976 4720 cmd.exe 108 PID 4720 wrote to memory of 3396 4720 cmd.exe 109 PID 4720 wrote to memory of 3396 4720 cmd.exe 109 PID 4720 wrote to memory of 3524 4720 cmd.exe 110 PID 4720 wrote to memory of 3524 4720 cmd.exe 110 PID 4720 wrote to memory of 2536 4720 cmd.exe 111 PID 4720 wrote to memory of 2536 4720 cmd.exe 111 PID 4720 wrote to memory of 2648 4720 cmd.exe 112 PID 4720 wrote to memory of 2648 4720 cmd.exe 112 PID 4720 wrote to memory of 2820 4720 cmd.exe 113 PID 4720 wrote to memory of 2820 4720 cmd.exe 113 PID 4720 wrote to memory of 728 4720 cmd.exe 114 PID 4720 wrote to memory of 728 4720 cmd.exe 114 PID 4720 wrote to memory of 4460 4720 cmd.exe 115 PID 4720 wrote to memory of 4460 4720 cmd.exe 115 PID 4720 wrote to memory of 4832 4720 cmd.exe 116 PID 4720 wrote to memory of 4832 4720 cmd.exe 116 PID 4720 wrote to memory of 1988 4720 cmd.exe 117 PID 4720 wrote to memory of 1988 4720 cmd.exe 117 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2708 attrib.exe 4832 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\60CD.tmp\60CE.tmp\60CF.bat C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\msg.exemsg * "Fatal Error: Something unusual has occured. Maybe try restarting your PC?"3⤵PID:2964
-
-
C:\Windows\system32\net.exenet session3⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:3000
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2468
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\SysWOW64\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1740
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Windows\System32\flare.bat"3⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:2708
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Everyone:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3572
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny SYSTEM:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3424
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Administrators:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4916
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Security Update" /t REG_SZ /d "C:\Windows\System32\flare.bat" /f3⤵
- Adds Run key to start application
PID:1548
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:392
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\flare_warning.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:916
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\CON" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4812
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\PRN" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4976
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AUX" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3396
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\NUL" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3524
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM1" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2536
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM2" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2648
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM3" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2820
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT1" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:728
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT2" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4460
-
-
C:\Windows\system32\attrib.exeattrib +s +h "C:\Users\Admin\Desktop\LPT2"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4832
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\LPT2\lockfile.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57d8bdc2999133334b777bc1ed27d9b40
SHA15fbd1e93721dcaa8656b8cdcc9f3aa62cd2230cf
SHA256a36a12f1a646dec97c943f3125b061c794566b3c0c684d7188b5995caf540823
SHA512fce27620bf78315fd44693bee5d17c6cbdb093c1dc26a107dbcb4dfc9c60fa44495e287ca28b882923e78aa66fc53458313a420eb67af8ad1a3c00e1cdafe264
-
Filesize
16B
MD535519859078faf1bb9ff9aa6d97e02f7
SHA1f62fa3cba186ac4fc65321e5b24f3b3c6713e168
SHA256c76a191235beca08d9290c53f8832be67b1b9671269674ece289e3162157d2b1
SHA512674ed9c45e4070cd2de21e7a74fe8327ad3db7234a306988fd579e126f6c37ce5a39fa45cbf2da818c81bf7dfcf160f4f993f9fb3d3a85a1530101564ced9df9
-
Filesize
91KB
MD51a137b783a1a39509329236672fe24cc
SHA1f6ecd8fb3f52fe31c357b2c2a23a68aa0a0989a7
SHA25699c985b3b072b5a1a793187cef71c494c6c4e9b963e77c0c3fcbaca46329c002
SHA512a9a79f413df02f331177f3833424f48e29edf0f95dbffc0e9f03d5b371d92f60e41f00d12a9667a11e5ca9f80548b4d127fec11862e869b512ab938bdd1f3d72