Resubmissions

20/05/2023, 23:14

230520-28ca3shg3z 3

20/05/2023, 23:09

230520-2492jsfa99 6

Analysis

  • max time kernel
    134s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2023, 23:09

General

  • Target

    MaritasBeta.exe

  • Size

    53.7MB

  • MD5

    f70233c9569d89568db1d85daad48704

  • SHA1

    cf2e57456393b099c12410a41a684ad28469e1b1

  • SHA256

    60514e03558e18cba000e619343ef0637452546bbfa2bb17870017875dc8e53e

  • SHA512

    7e8ffeb8ddbca63cf03be4b366ebb410b228f269009bb6ca860e98b0998f48c45f76dfaac4dff94307fc1b4582e5d2c2f016a3834653e4ecfeb1ee6f645239bb

  • SSDEEP

    393216:iGtlSkEbhX2H3hImWGeZKSfeU1RhU3eKEL6Xu5eR3mXu2z2IecUtA7z7uRqB5SxA:iX8r2z/SyKBQs3E2gHx6IVswnbOo52eh

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MaritasBeta.exe
    "C:\Users\Admin\AppData\Local\Temp\MaritasBeta.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2136
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1388
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\akb3nn12\akb3nn12.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:872
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES185A.tmp" "c:\Users\Admin\AppData\Local\Temp\akb3nn12\CSC6B154842580A4859A2BB6F39B831FCE.TMP"
            4⤵
              PID:4428
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3288
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4580
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:760
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
          2⤵
            PID:3392
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1396
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4064
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1012
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:5076
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:3936
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4936
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:5040
              • C:\Windows\System32\reg.exe
                C:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid
                3⤵
                  PID:3028
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"
                2⤵
                  PID:1136

              Network

                    MITRE ATT&CK Matrix

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      2f57fde6b33e89a63cf0dfdd6e60a351

                      SHA1

                      445bf1b07223a04f8a159581a3d37d630273010f

                      SHA256

                      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                      SHA512

                      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      2KB

                      MD5

                      2f87410b0d834a14ceff69e18946d066

                      SHA1

                      f2ec80550202d493db61806693439a57b76634f3

                      SHA256

                      5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                      SHA512

                      a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      2KB

                      MD5

                      cb9e1c4f4cf3e55fa112da2c9d21aaea

                      SHA1

                      a25c13e7628963a5835e050ffaf72824f7de71c6

                      SHA256

                      82e75a24aceb112c1d51f3425021381cf4f33f6486df82c0bcbd5782444572a6

                      SHA512

                      db49e27a38946e824958b3f1a385d6592a1def667c5c1a2ca0f569d98f4dc75c8b8bd5f08299d990e14de4ab24e5e21b2352da67f7cf045be315da2ca6c6335f

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      2KB

                      MD5

                      dd06ee6761e379fc8efd773064376ae3

                      SHA1

                      90c15d0748ef831bd32529c1f1194ace1c7f2fe0

                      SHA256

                      4d29e88c28a589a44ad74f48be6712c660b5ea803f94c9df918d17b9cff5e039

                      SHA512

                      fd16c45771e8661f053b3cab47311b95cf490a5da845c8a1dc1cb516da648c9b82a0264811c4419c61545d2c707984062ef0adc406e9f36782415a1367c8e2a5

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      2KB

                      MD5

                      025ff67b36a5ac3b2bd9ba076ce0e1a7

                      SHA1

                      0808e674c2d8b91264788f4efb032b3485a19c88

                      SHA256

                      9cd8446069e765e6bedec40c567477755bdff3e51f8f21c6a8158b6880264d76

                      SHA512

                      0481c6a3d053f9d644ffa3418519dfe7ae572ea036386f81ab2ff68a7bce0453906dbe988c96b106406603bf56cdd2dcf6021f527ba8691ba7d30452876d9f6d

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      256B

                      MD5

                      e010d7a77e59cd3fce42360d1956c20c

                      SHA1

                      0d2377a259d9d5bf411394641d717dbf2ba569d7

                      SHA256

                      781a143d4746985911429cba057066dd6a0ac7bf9afd6c8c3147654382a4616b

                      SHA512

                      71e976ad6843aa1da65909870afeca60f6a0c2a32ca2cd816554e9e43a31c738a801ecb6d1e49ccd34cac602f48f0d7697e26395c4c93148b2ea8a7c3c9df85d

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      2KB

                      MD5

                      03f4b31e4110dfae600d30bad1f191be

                      SHA1

                      4b3c2067b03ffbd79690f8ab858a08dec339b532

                      SHA256

                      5a6742bfca86932a1e0f5fc8bef49e428c1b919b504a55275dcd6b1150048c5f

                      SHA512

                      57c80ddcc30f3ffaa8a52314e98fb88a20a11e2684cc89f71d0e33fb8d19b1ea6cd4891f6ad61550aacbc57caa414d8e7eadc76d8d50a6ef7d06e6bc01ab505b

                    • C:\Users\Admin\AppData\Local\Temp\RES185A.tmp

                      Filesize

                      1KB

                      MD5

                      5e655c80ce3a355392131def5b113abf

                      SHA1

                      eeeb7fe0773baab57f10d05957e3a6d0be0b9aa1

                      SHA256

                      be5d99bb5ac20b8426d311fa4d375af1378af1a2e95f40756eeee4714f8dd994

                      SHA512

                      315710f1902c9af8ca3278c6add86fbb64b845199652886dec5794002856612aea490b6b776c71975139b6299209addf5d6459566ebaa49e3a8ab3a25f481682

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h0hl1ftx.krz.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\akb3nn12\akb3nn12.dll

                      Filesize

                      3KB

                      MD5

                      0e8deb087bab1fdf622816fea0347802

                      SHA1

                      8f360a68f4ce3fab713e6e2c96f01bf604d5b2a7

                      SHA256

                      185621dca1aedb7a767212b7b9784a3da8f15b1a3d36a7760a055c32f8fa7971

                      SHA512

                      600abee14dcc773a024e8b242b5550154932b8b0591e75918df1113c097e8e6b91740d9704f0803edf68c4c226c31c6b8a9f0ed0ca8274945388b00721b35906

                    • \??\c:\Users\Admin\AppData\Local\Temp\akb3nn12\CSC6B154842580A4859A2BB6F39B831FCE.TMP

                      Filesize

                      652B

                      MD5

                      982cea3ae7d1389fd4724ab289b26ac2

                      SHA1

                      6f69715dd39bc658475a7ddab11afd4645245fcb

                      SHA256

                      83cc83f457d853a15a5aa52826d705534d27af83d4fbfcaa555454fd80a2de42

                      SHA512

                      4d65befaa83defcc386e5b4aa3c964ec4c9fddcf647267d01140ea131eab97b09befeabc1edb9547f69ba23320d15b9d34a0be669a940c981dd9cb8f67049b57

                    • \??\c:\Users\Admin\AppData\Local\Temp\akb3nn12\akb3nn12.0.cs

                      Filesize

                      312B

                      MD5

                      ecbf151f81ff98f7dff196304a40239e

                      SHA1

                      ccf6b97b6f8276656b042d64f0595963fe9ec79c

                      SHA256

                      295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8

                      SHA512

                      4526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720

                    • \??\c:\Users\Admin\AppData\Local\Temp\akb3nn12\akb3nn12.cmdline

                      Filesize

                      369B

                      MD5

                      c02c6b1b533f867add3ae83a48cc7c9b

                      SHA1

                      58e204c23fb1b8b801008622f6555761998d5d19

                      SHA256

                      7eb568a9ff95faddf9f0c2811c92e837db4cbc086a71df018f6435e972ed1487

                      SHA512

                      080ad11953c5cbe489870742e85cf5792860df8e88e8ded14938a1a1aaa737b595a54706217784ef22b9cf394ea454e8fde4e6973ddc1480553da81f93600830

                    • memory/760-216-0x000001A3B3060000-0x000001A3B3070000-memory.dmp

                      Filesize

                      64KB

                    • memory/760-217-0x000001A3B3060000-0x000001A3B3070000-memory.dmp

                      Filesize

                      64KB

                    • memory/760-218-0x000001A3B3060000-0x000001A3B3070000-memory.dmp

                      Filesize

                      64KB

                    • memory/1012-257-0x0000027E8CA00000-0x0000027E8CA10000-memory.dmp

                      Filesize

                      64KB

                    • memory/1012-228-0x0000027E8CA00000-0x0000027E8CA10000-memory.dmp

                      Filesize

                      64KB

                    • memory/1012-259-0x0000027E8CA00000-0x0000027E8CA10000-memory.dmp

                      Filesize

                      64KB

                    • memory/1388-167-0x000001FC3D820000-0x000001FC3D830000-memory.dmp

                      Filesize

                      64KB

                    • memory/1388-180-0x000001FC3D830000-0x000001FC3DA4C000-memory.dmp

                      Filesize

                      2.1MB

                    • memory/1388-159-0x000001FC3D820000-0x000001FC3D830000-memory.dmp

                      Filesize

                      64KB

                    • memory/1396-226-0x0000017C07BD0000-0x0000017C07BE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1396-258-0x0000017C07BD0000-0x0000017C07BE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1396-224-0x0000017C07BD0000-0x0000017C07BE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3288-147-0x000001C228BC0000-0x000001C228BD0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3288-157-0x000001C228BC0000-0x000001C228BD0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3288-160-0x000001C2292B0000-0x000001C2292F4000-memory.dmp

                      Filesize

                      272KB

                    • memory/3288-163-0x000001C229380000-0x000001C2293F6000-memory.dmp

                      Filesize

                      472KB

                    • memory/3288-187-0x000001C228BD0000-0x000001C228DEC000-memory.dmp

                      Filesize

                      2.1MB

                    • memory/3288-148-0x000001C228BC0000-0x000001C228BD0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3288-183-0x000001C229260000-0x000001C229284000-memory.dmp

                      Filesize

                      144KB

                    • memory/3288-140-0x000001C228B40000-0x000001C228B62000-memory.dmp

                      Filesize

                      136KB

                    • memory/3288-182-0x000001C229260000-0x000001C22928A000-memory.dmp

                      Filesize

                      168KB

                    • memory/4064-227-0x000002165F780000-0x000002165F790000-memory.dmp

                      Filesize

                      64KB

                    • memory/4064-225-0x000002165F780000-0x000002165F790000-memory.dmp

                      Filesize

                      64KB

                    • memory/4580-202-0x000001CAD7440000-0x000001CAD7450000-memory.dmp

                      Filesize

                      64KB

                    • memory/4580-190-0x000001CAD7440000-0x000001CAD7450000-memory.dmp

                      Filesize

                      64KB

                    • memory/4580-189-0x000001CAD7440000-0x000001CAD7450000-memory.dmp

                      Filesize

                      64KB

                    • memory/4936-285-0x0000024B3CFA0000-0x0000024B3CFB0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4936-287-0x0000024B3CFA0000-0x0000024B3CFB0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4936-286-0x0000024B3CFA0000-0x0000024B3CFB0000-memory.dmp

                      Filesize

                      64KB