Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2023 14:30

General

  • Target

    fordanskningernes hildebrand.exe

  • Size

    684KB

  • MD5

    8db600d5b4168b5d358209fa4b85bd5f

  • SHA1

    d6822e043548fbacd692a14d7dc17250482c43bc

  • SHA256

    2ef9a5215999c03ea03636ae06f8c66b3ed1274153bdaec215a189cd148669b5

  • SHA512

    c2103215579019f69aa3e4adfa2067d90c9189c093c7b065e9693e3d8745f084810e7652dd0e2e6638eecc18344641aaa23460eb2799c3829b73462b08f741ca

  • SSDEEP

    12288:swFGHEDwfu4MFVS/GCFj+an2ry7/hFwz7ylgimtdYM3O0V7bbj:s5HEMfuDDSuCF6an2rg/hF7lgZtub0Vv

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fordanskningernes hildebrand.exe
    "C:\Users\Admin\AppData\Local\Temp\fordanskningernes hildebrand.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Osirify120=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Bojanna.Win';$Calvarias=$Osirify120.SubString(53221,3);.$Calvarias($Osirify120)"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 2556
        3⤵
        • Program crash
        PID:116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 468 -ip 468
    1⤵
      PID:3412

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Rkkens.ini

      Filesize

      32B

      MD5

      a8ca1db6ae34f5e5c152094f44f92476

      SHA1

      9fe0fd4e6907c4f9099d2533c3bade4ffa0968e7

      SHA256

      1f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3

      SHA512

      e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5lwlc1np.0or.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Bojanna.Win

      Filesize

      52KB

      MD5

      b78df76358c01d725b0d9e498d32d595

      SHA1

      89c5bc6f9d1d1da207899ce0677c24a99329dc70

      SHA256

      6cacb39cdff332ae98782d33db6fc877a76a8e1e01fa7a0ec9acf45a19cca2ea

      SHA512

      d7268e8c0e6040515d385835206af5b67c78ec5f6c4bdf7053ec28c00e3dcfdfa318fd03935e989bd856e3614a2ebb2d8bc50e2ecdbe7433b211291b0746cf8d

    • C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Overfit.Hov

      Filesize

      270KB

      MD5

      ec46e3263c35f658579cd1572e57def0

      SHA1

      18468cb8363e04d8257fd5503cc6350ff7432b88

      SHA256

      690cdbe972c183ace073bad0f8567a3f2f2f15bf3f31e0e714797fdd68bc4e03

      SHA512

      d283ea4285dd37379499dc45128449b05b41229149d22819d3b40f80deba233be346741242d6f64f0697562f1fbec5d2818b7d05e0a4d95692246334bca85768

    • memory/468-168-0x0000000005940000-0x0000000005C94000-memory.dmp

      Filesize

      3.3MB

    • memory/468-171-0x0000000006260000-0x00000000062F6000-memory.dmp

      Filesize

      600KB

    • memory/468-156-0x0000000004D50000-0x0000000004D72000-memory.dmp

      Filesize

      136KB

    • memory/468-157-0x0000000005640000-0x00000000056A6000-memory.dmp

      Filesize

      408KB

    • memory/468-155-0x0000000004E60000-0x0000000005488000-memory.dmp

      Filesize

      6.2MB

    • memory/468-163-0x00000000056E0000-0x0000000005746000-memory.dmp

      Filesize

      408KB

    • memory/468-154-0x0000000004820000-0x0000000004830000-memory.dmp

      Filesize

      64KB

    • memory/468-169-0x0000000005D10000-0x0000000005D2E000-memory.dmp

      Filesize

      120KB

    • memory/468-170-0x0000000005D50000-0x0000000005D9C000-memory.dmp

      Filesize

      304KB

    • memory/468-153-0x0000000004820000-0x0000000004830000-memory.dmp

      Filesize

      64KB

    • memory/468-172-0x0000000006210000-0x000000000622A000-memory.dmp

      Filesize

      104KB

    • memory/468-173-0x0000000006330000-0x0000000006352000-memory.dmp

      Filesize

      136KB

    • memory/468-174-0x0000000007300000-0x00000000078A4000-memory.dmp

      Filesize

      5.6MB

    • memory/468-152-0x0000000073DE0000-0x0000000074590000-memory.dmp

      Filesize

      7.7MB

    • memory/468-176-0x0000000007F30000-0x00000000085AA000-memory.dmp

      Filesize

      6.5MB

    • memory/468-151-0x0000000002400000-0x0000000002436000-memory.dmp

      Filesize

      216KB

    • memory/468-179-0x0000000073DE0000-0x0000000074590000-memory.dmp

      Filesize

      7.7MB