Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2023 17:19

General

  • Target

    PowerISO8.exe

  • Size

    4.4MB

  • MD5

    6de0b9deca77a1e3fc40e3dbaa1c5ecd

  • SHA1

    e75d90e85cb8a20cf4e61cf7b3997248e9a9507c

  • SHA256

    f02be373f3da7971daed34afe611241b9d2d5a0fec6ebf087228557c20e92d73

  • SHA512

    73c91d0e6b67f361d4ed1b77a17c33f25b4965b7bedcf5537b4a5cb80a9152b6d98ac80b6d57d22ce8436c4a70eb88b7a211c0154a2639238ac9c185b5c75cb6

  • SSDEEP

    98304:o6d2Ys647Fz6xd2jVbuZy9zz6PssMtc6XOoxzl7qBx0CV2DcthUh:o6EYs2suMKksTov+BqCVbIh

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PowerISO8.exe
    "C:\Users\Admin\AppData\Local\Temp\PowerISO8.exe"
    1⤵
    • Checks for any installed AV software in registry
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2224

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Security Software Discovery

1
T1063

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    23c5e54ac611dbd7c589bef97a21d087

    SHA1

    eda8c45174253b4104b7be715b95015a9a99f7ea

    SHA256

    4ccbf6a76f31817d608fb6e44452f923184c6917c8688fcb3af7c27315aef468

    SHA512

    48a3a7c0dc3de571b09411718e332b7fc4a593fa2b38a4e0e838b3ca6a5d254b6b7a26a0287dd15f6b8f74587ff3850c7d08c66c2f1505f21a958ba650d8aa1b

  • C:\Users\Admin\AppData\Local\Temp\Cab48AB.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar492B.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\nse24E2.tmp\nst27FE.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • \Users\Admin\AppData\Local\Temp\nse24E2.tmp\System.dll
    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • \Users\Admin\AppData\Local\Temp\nse24E2.tmp\nst27FE.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • \Users\Admin\AppData\Local\Temp\nse24E2.tmp\nst27FE.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • \Users\Admin\AppData\Local\Temp\nse24E2.tmp\nst27FE.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • memory/2224-70-0x0000000001FA0000-0x0000000001FE0000-memory.dmp
    Filesize

    256KB

  • memory/2224-74-0x0000000002F40000-0x0000000002F50000-memory.dmp
    Filesize

    64KB

  • memory/2224-185-0x0000000005E80000-0x0000000005EC4000-memory.dmp
    Filesize

    272KB

  • memory/2224-188-0x0000000001FA0000-0x0000000001FE0000-memory.dmp
    Filesize

    256KB