Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2023 10:35

General

  • Target

    PO NO.0200058.exe

  • Size

    912KB

  • MD5

    de68b61ea9b8086259280b19f27ede5c

  • SHA1

    b9cd5e9f2c6a936361bb48d04d61a595d83d71af

  • SHA256

    c86de3e77ae95280bae0e6ba2c1248bb30760b972f4e39993446be343d4a3808

  • SHA512

    6a612b8c208e1408aeac0f9b801ce7b452c97aefeeccf308a94e07aac3f20129a5e10507d88fdab4ac843a7823f7906296800e763bea404048f94a801b38102d

  • SSDEEP

    24576:nyr9a8gJ2wgF7EVGBOPTqUqtLRTZoO/rAfWMyQqph:w9a8gclUAOP+L9RV5/rAfWMAph

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO NO.0200058.exe
    "C:\Users\Admin\AppData\Local\Temp\PO NO.0200058.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden $derremc = Get-Content 'C:\Users\Admin\AppData\Local\Temp\sammenbygninger\Hairs\Jvnspnding\Pennatulidae\overweather.Tro' ; powershell.exe "$derremc"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy698D.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    ec0504e6b8a11d5aad43b296beeb84b2

    SHA1

    91b5ce085130c8c7194d66b2439ec9e1c206497c

    SHA256

    5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

    SHA512

    3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

  • memory/2700-18-0x0000000073BE0000-0x000000007418B000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-19-0x0000000073BE0000-0x000000007418B000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-20-0x0000000002470000-0x00000000024B0000-memory.dmp

    Filesize

    256KB

  • memory/2700-22-0x0000000002470000-0x00000000024B0000-memory.dmp

    Filesize

    256KB

  • memory/2700-21-0x0000000002470000-0x00000000024B0000-memory.dmp

    Filesize

    256KB

  • memory/2700-23-0x0000000073BE0000-0x000000007418B000-memory.dmp

    Filesize

    5.7MB