Analysis
-
max time kernel
83s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
Flarenew.exe
Resource
win10v2004-20250314-en
General
-
Target
Flarenew.exe
-
Size
91KB
-
MD5
cc781da6668d36fd69268355a98acfcc
-
SHA1
e517879b4017a82cb229ae8c3696e9c574b0e351
-
SHA256
8ad988358df106e54c497704f229ca6ce1092d6fc4632b2fb6b9fe300a3d7b18
-
SHA512
524967733b621ec16e29164c7000b0e1173e45423036d162edff6ade349da265aaf46bd12052aee53271df48f7242c6956a5c004d53d7274b8d93618ab508166
-
SSDEEP
1536:X7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfAwt8O4:L7DhdC6kzWypvaQ0FxyNTBfAWY
Malware Config
Signatures
-
Possible privilege escalation attempt 16 IoCs
pid Process 100 takeown.exe 5076 icacls.exe 2648 takeown.exe 556 icacls.exe 4868 icacls.exe 4996 icacls.exe 4912 icacls.exe 4332 icacls.exe 3592 icacls.exe 812 icacls.exe 4816 icacls.exe 5068 icacls.exe 4684 icacls.exe 3732 icacls.exe 468 icacls.exe 3876 icacls.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4020 attrib.exe 4972 attrib.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.bat cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.vbs cmd.exe -
Modifies file permissions 1 TTPs 16 IoCs
pid Process 3592 icacls.exe 556 icacls.exe 4868 icacls.exe 4996 icacls.exe 4912 icacls.exe 4684 icacls.exe 3732 icacls.exe 3876 icacls.exe 100 takeown.exe 4332 icacls.exe 812 icacls.exe 2648 takeown.exe 468 icacls.exe 4816 icacls.exe 5076 icacls.exe 5068 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Update = "C:\\Windows\\System32\\flare.bat" reg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat attrib.exe File created C:\Windows\System32\flare_helper.bat cmd.exe File opened for modification C:\Windows\System32\flare_helper.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flarenew.exe -
Kills process with taskkill 1 IoCs
pid Process 5760 taskkill.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 4856 notepad.exe 2240 notepad.exe 1548 NOTEPAD.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5760 taskkill.exe Token: SeTakeOwnershipPrivilege 100 takeown.exe Token: SeTakeOwnershipPrivilege 2648 takeown.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5436 wscript.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 6088 wrote to memory of 1548 6088 Flarenew.exe 87 PID 6088 wrote to memory of 1548 6088 Flarenew.exe 87 PID 1548 wrote to memory of 3272 1548 cmd.exe 88 PID 1548 wrote to memory of 3272 1548 cmd.exe 88 PID 1548 wrote to memory of 5336 1548 cmd.exe 89 PID 1548 wrote to memory of 5336 1548 cmd.exe 89 PID 5336 wrote to memory of 5056 5336 net.exe 91 PID 5336 wrote to memory of 5056 5336 net.exe 91 PID 1548 wrote to memory of 5760 1548 cmd.exe 92 PID 1548 wrote to memory of 5760 1548 cmd.exe 92 PID 1548 wrote to memory of 100 1548 cmd.exe 94 PID 1548 wrote to memory of 100 1548 cmd.exe 94 PID 1548 wrote to memory of 2648 1548 cmd.exe 95 PID 1548 wrote to memory of 2648 1548 cmd.exe 95 PID 1548 wrote to memory of 4332 1548 cmd.exe 96 PID 1548 wrote to memory of 4332 1548 cmd.exe 96 PID 1548 wrote to memory of 3592 1548 cmd.exe 97 PID 1548 wrote to memory of 3592 1548 cmd.exe 97 PID 1548 wrote to memory of 4020 1548 cmd.exe 98 PID 1548 wrote to memory of 4020 1548 cmd.exe 98 PID 1548 wrote to memory of 556 1548 cmd.exe 99 PID 1548 wrote to memory of 556 1548 cmd.exe 99 PID 1548 wrote to memory of 468 1548 cmd.exe 100 PID 1548 wrote to memory of 468 1548 cmd.exe 100 PID 1548 wrote to memory of 812 1548 cmd.exe 101 PID 1548 wrote to memory of 812 1548 cmd.exe 101 PID 1548 wrote to memory of 4500 1548 cmd.exe 102 PID 1548 wrote to memory of 4500 1548 cmd.exe 102 PID 1548 wrote to memory of 4788 1548 cmd.exe 103 PID 1548 wrote to memory of 4788 1548 cmd.exe 103 PID 1548 wrote to memory of 4856 1548 cmd.exe 104 PID 1548 wrote to memory of 4856 1548 cmd.exe 104 PID 1548 wrote to memory of 4868 1548 cmd.exe 105 PID 1548 wrote to memory of 4868 1548 cmd.exe 105 PID 1548 wrote to memory of 4816 1548 cmd.exe 107 PID 1548 wrote to memory of 4816 1548 cmd.exe 107 PID 1548 wrote to memory of 4996 1548 cmd.exe 108 PID 1548 wrote to memory of 4996 1548 cmd.exe 108 PID 1548 wrote to memory of 4912 1548 cmd.exe 109 PID 1548 wrote to memory of 4912 1548 cmd.exe 109 PID 1548 wrote to memory of 5076 1548 cmd.exe 110 PID 1548 wrote to memory of 5076 1548 cmd.exe 110 PID 1548 wrote to memory of 5068 1548 cmd.exe 111 PID 1548 wrote to memory of 5068 1548 cmd.exe 111 PID 1548 wrote to memory of 4684 1548 cmd.exe 112 PID 1548 wrote to memory of 4684 1548 cmd.exe 112 PID 1548 wrote to memory of 3732 1548 cmd.exe 113 PID 1548 wrote to memory of 3732 1548 cmd.exe 113 PID 1548 wrote to memory of 3876 1548 cmd.exe 114 PID 1548 wrote to memory of 3876 1548 cmd.exe 114 PID 1548 wrote to memory of 4972 1548 cmd.exe 115 PID 1548 wrote to memory of 4972 1548 cmd.exe 115 PID 1548 wrote to memory of 2240 1548 cmd.exe 116 PID 1548 wrote to memory of 2240 1548 cmd.exe 116 PID 3220 wrote to memory of 5436 3220 cmd.exe 142 PID 3220 wrote to memory of 5436 3220 cmd.exe 142 PID 2220 wrote to memory of 1356 2220 cmd.exe 147 PID 2220 wrote to memory of 1356 2220 cmd.exe 147 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4020 attrib.exe 4972 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6088 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8FCC.tmp\8FDD.tmp\8FDE.bat C:\Users\Admin\AppData\Local\Temp\Flarenew.exe"2⤵
- Drops startup file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\msg.exemsg * "Fatal Error: Something unusual has occured. Maybe try restarting your PC?"3⤵PID:3272
-
-
C:\Windows\system32\net.exenet session3⤵
- Suspicious use of WriteProcessMemory
PID:5336 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:5056
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5760
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\taskmgr.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4332
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\SysWOW64\taskmgr.exe /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3592
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Windows\System32\flare.bat"3⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:4020
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Everyone:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:556
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny SYSTEM:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:468
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Administrators:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:812
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Security Update" /t REG_SZ /d "C:\Windows\System32\flare.bat" /f3⤵
- Adds Run key to start application
PID:4500
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:4788
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\flare_warning.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:4856
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\CON" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4868
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\PRN" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4816
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AUX" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4996
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\NUL" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4912
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM1" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5076
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM2" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5068
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM3" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4684
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT1" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3732
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT2" /deny Everyone:(F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3876
-
-
C:\Windows\system32\attrib.exeattrib +s +h "C:\Users\Admin\Desktop\LPT2"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4972
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\LPT2\Fixes.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:2240
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2884
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.bat1⤵PID:2648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.bat" "1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\system32\wscript.exewscript error.vbs2⤵
- Suspicious use of FindShellTrayWindow
PID:5436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\error.bat" "1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\wscript.exewscript error.vbs2⤵PID:1356
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\flare_warning.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5be3e09162aafb8ef522ff2a2611c9565
SHA1a90dfea533846ba5dc652dc8f5a0ac9f6718ab54
SHA256b376cc491088c2a36910e7bd798fff36468c9bf55eab75b36e4cedef65e0e402
SHA512599986f1597d776490a146c916ff2d7dfa52fde3f645bf602034cfa3ab3684eac52d5c107b145dc3b07c5663ffa1d104a288a50ad18200a70e6c802d93e3fd20
-
Filesize
237B
MD529871f22521d0ab5777e9dfc20fc9c55
SHA1afe0417165c9011c338b416f4eaaddca0cf7fc52
SHA256808a5b00ba85be2d7d6a2b23389b160ed0fa7635508c564af1bf8784a2edede6
SHA512c90a432df0da718fdb8b2ae98c6675da113333d810ad91ca57150e24a5d104cca02f849d242a6c2a45dc48172be623a63f19a2c7aae421a2cf42bb08f302e888
-
Filesize
159B
MD584046e85ee39a8cd13b4a333c772ecee
SHA118c4ed2314a8964195aaa13142e18b666ad36b0b
SHA256b030e4c6bf81e3ac3518c25df44f0eff58e2c01280a3342006e0682b7cbdb93b
SHA51242a7290fade1fba89e0b708a990182840b9e379abf3850695b8c815f0d47ad265e5628bcfad3861d1eee5696cbfdab63e9e7327ad0de9e24c07e40eed71c3cc1
-
Filesize
36B
MD59ea9c312f34cfeda8394b84c0dfd1fc9
SHA1d587d14e675fa07820e4a3c513285b42831c90bf
SHA2564bfc6d2ad894c24dcedc920096679c80c1dd4340528ba9a071cff8b9bf8ab9e7
SHA5120ed43563d7e3492773d30abdad9199b5cb9fd49ffb32c0c0a9cc1471545991131644b81c61f70f0f062ee9ab5314005b7677982c8074696aa832b226cd32ca8d
-
Filesize
85B
MD506f0a7e183c60d2d25359f8805ac79c8
SHA188dcb58b0342aaa5d26fbcc4f331980280d8788e
SHA256c4ee6d94b5725af6c1ed91eb62fc34db9be62aca661976a5c24bdbb3db24e1d6
SHA512ee60f735fcee65e0c76a9240b660bb850f285900d5229dcf102d244e14248b24f5f102523efee659f4de6ac339fa1f554e36a712bd3209a4f3ab1897a63314b3
-
Filesize
91KB
MD5cc781da6668d36fd69268355a98acfcc
SHA1e517879b4017a82cb229ae8c3696e9c574b0e351
SHA2568ad988358df106e54c497704f229ca6ce1092d6fc4632b2fb6b9fe300a3d7b18
SHA512524967733b621ec16e29164c7000b0e1173e45423036d162edff6ade349da265aaf46bd12052aee53271df48f7242c6956a5c004d53d7274b8d93618ab508166