Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2023 15:32

General

  • Target

    PowerISO8-x64.exe

  • Size

    4.5MB

  • MD5

    95bf82bd5494bc133551400bebce98ff

  • SHA1

    1b67264fd20689dfbe709ec9c38c39ef2a4592ab

  • SHA256

    a185092d5e7b034583ad09ad4e0487d1c1b98be6bd62675435b05cf319e1e91e

  • SHA512

    43344e37553f9a7aceb007b92589e70224298c82541399323b3b1c09bd33f1039fa703bbc1c05ad5e0b227274f7ec7abc826e875759ffb37322b2dcfc8448c77

  • SSDEEP

    98304:M4U3zP091M3II17zlcXHqNxKPSepsYk5qGHsEBkSFBsb2Pw6Ie:M4gMM3IxXmsfk5qSsEVsSPw6X

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PowerISO8-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\PowerISO8-x64.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2468

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b21ebb71335ffc1213144b1cd3ea05a6

    SHA1

    03b5418842a0a7e298c8233aa27141f831adb47c

    SHA256

    428a1bbfef8749778371b8e8b106cc8b2b96842ee227207e8d8e1007fe5eaefe

    SHA512

    a534e056515bc8b8147e963bb97f9ea3fa1f8f8d0e82c0e301e1df1f4c5e4b4bd5ffebc5e68e040ea05be6aa11191acc7dbf442c6449c90c4bd0eec97b6f1642

  • C:\Users\Admin\AppData\Local\Temp\Cab89CF.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar8A20.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\nst7FFB.tmp\nsd80D6.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • \Users\Admin\AppData\Local\Temp\nst7FFB.tmp\System.dll
    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • \Users\Admin\AppData\Local\Temp\nst7FFB.tmp\nsd80D6.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • \Users\Admin\AppData\Local\Temp\nst7FFB.tmp\nsd80D6.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • \Users\Admin\AppData\Local\Temp\nst7FFB.tmp\nsd80D6.tmp
    Filesize

    29KB

    MD5

    e04599f60a2f10bc20eac0b3b8e12d36

    SHA1

    d6724458d2e9bb8bb08455c330a50b79d66fa686

    SHA256

    6cf56ae7cfb297d283082c697e135ed478d8e31dfd65bec0701e59f6347487c3

    SHA512

    bca2f304abc2910c3f8d640de82a6b9cfcf7af9768689c753c5cc5e2f7a09c956d8d70a236b4edb76ff0a2d0bbb1dabe0a22f9f802b7de5a4d06c89b97472f77

  • memory/2468-69-0x0000000001EE0000-0x0000000001F20000-memory.dmp
    Filesize

    256KB

  • memory/2468-74-0x0000000074880000-0x0000000074F6E000-memory.dmp
    Filesize

    6.9MB

  • memory/2468-73-0x0000000002E70000-0x0000000002E80000-memory.dmp
    Filesize

    64KB

  • memory/2468-195-0x0000000005910000-0x0000000005954000-memory.dmp
    Filesize

    272KB

  • memory/2468-198-0x0000000001EE0000-0x0000000001F20000-memory.dmp
    Filesize

    256KB

  • memory/2468-199-0x0000000074880000-0x0000000074F6E000-memory.dmp
    Filesize

    6.9MB