Analysis
-
max time kernel
60s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
FreeWill.exe
Resource
win10v2004-20250314-en
General
-
Target
FreeWill.exe
-
Size
7.1MB
-
MD5
4318d93e4b3d3590f3b4c6c2cdd794f3
-
SHA1
166c8a860d24671c6236944d32f5713a91449893
-
SHA256
ebbb8769086dcf3f7bdaf9366cf6a5ac4c5ac981e4be3c69d08ce06fc80c2f28
-
SHA512
291b8fa416147008a6c703d1cae0006f26b91b1561e6919208bdf329622c1f1137bd7dad3f4f2707c33241db93d243ded74317aa7cb1bccfdb6926057f5413da
-
SSDEEP
196608:JOoKoTbXauPIo+8izlrAjDCbXauPIo+8iAo:XlT70Rcu7M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, FreeWill.exe" FreeWill.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" FreeWill.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FreeWill.exe -
Renames multiple (1003) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" FreeWill.exe -
Disables Task Manager via registry modification
-
Possible privilege escalation attempt 4 IoCs
pid Process 2280 takeown.exe 1120 icacls.exe 4836 icacls.exe 224 takeown.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation FreeWill.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Modifies file permissions 1 TTPs 4 IoCs
pid Process 224 takeown.exe 2280 takeown.exe 1120 icacls.exe 4836 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection FreeWill.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" FreeWill.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FreeWill.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FreeWill.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\system32\WindowsUpdateService.exe FreeWill.exe File opened for modification C:\Windows\system32\WindowsUpdateService.exe FreeWill.exe File created C:\Windows\system32\LogonUITrue.exe FreeWill.exe File opened for modification C:\Windows\system32\LogonUITrue.exe FreeWill.exe File created C:\Windows\system32\LogonUI.exe FreeWill.exe File created C:\Windows\system32\FreeWill.exe FreeWill.exe File opened for modification C:\Windows\system32\FreeWill.exe FreeWill.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FreeWill_img.png" FreeWill.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\FreeWill.exe FreeWill.exe File opened for modification C:\Windows\FreeWill.exe FreeWill.exe File created C:\Windows\bootfcg.dat FreeWill.exe File opened for modification C:\Windows\bootfcg.dat FreeWill.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS FreeWill.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer FreeWill.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion FreeWill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 224 takeown.exe Token: SeTakeOwnershipPrivilege 2280 takeown.exe Token: 33 5028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5028 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 FreeWill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4700 2484 FreeWill.exe 97 PID 2484 wrote to memory of 4700 2484 FreeWill.exe 97 PID 4700 wrote to memory of 224 4700 cmd.exe 99 PID 4700 wrote to memory of 224 4700 cmd.exe 99 PID 2484 wrote to memory of 3404 2484 FreeWill.exe 100 PID 2484 wrote to memory of 3404 2484 FreeWill.exe 100 PID 3404 wrote to memory of 2280 3404 cmd.exe 102 PID 3404 wrote to memory of 2280 3404 cmd.exe 102 PID 2484 wrote to memory of 5116 2484 FreeWill.exe 103 PID 2484 wrote to memory of 5116 2484 FreeWill.exe 103 PID 5116 wrote to memory of 1120 5116 cmd.exe 105 PID 5116 wrote to memory of 1120 5116 cmd.exe 105 PID 2484 wrote to memory of 4608 2484 FreeWill.exe 108 PID 2484 wrote to memory of 4608 2484 FreeWill.exe 108 PID 4608 wrote to memory of 4836 4608 cmd.exe 110 PID 4608 wrote to memory of 4836 4608 cmd.exe 110 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FreeWill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FreeWill.exe"C:\Users\Admin\AppData\Local\Temp\FreeWill.exe"1⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender DisableAntiSpyware settings
- UAC bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c takeown /f C:\Windows\system32 /a2⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32 /a3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c takeown /f C:\Windows\system32\LogonUI.exe /a2⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\LogonUI.exe /a3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c icacls C:\Windows\system32 /grant %username%:F2⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\icacls.exeicacls C:\Windows\system32 /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1120
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c icacls C:\Windows\system32\LogonUI.exe /grant %username%:F2⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\system32\icacls.exeicacls C:\Windows\system32\LogonUI.exe /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4836
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f4 0x3f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.1MB
MD54318d93e4b3d3590f3b4c6c2cdd794f3
SHA1166c8a860d24671c6236944d32f5713a91449893
SHA256ebbb8769086dcf3f7bdaf9366cf6a5ac4c5ac981e4be3c69d08ce06fc80c2f28
SHA512291b8fa416147008a6c703d1cae0006f26b91b1561e6919208bdf329622c1f1137bd7dad3f4f2707c33241db93d243ded74317aa7cb1bccfdb6926057f5413da