Analysis
-
max time kernel
42s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
139e2d5159fdbdec5850b66bca37b3e9.exe
Resource
win7-20231215-en
Errors
General
-
Target
139e2d5159fdbdec5850b66bca37b3e9.exe
-
Size
342KB
-
MD5
139e2d5159fdbdec5850b66bca37b3e9
-
SHA1
f6170367aed2935d5d91f5cb785a675ab69cc329
-
SHA256
3ce20e1e11f11e52a59baff6ece6ffd6516bb634ef44b4b329dd608ed910d58e
-
SHA512
8b77166d69c54c1152ce10caf88c19b4b126e4e6e9bd5897bdd1a5f19dde5642b30514e3ed2497f73d7e9f4ed047e1cf5fc7d3c57136ccdf4bfb3f756077c177
-
SSDEEP
6144:Bbk7LQucQEL0yWfItphR6a2BgN1ifWwgeRhinXWNbDlGTYmBFn2q6ZaqY1v:scuch0y+IVka2ONA4UyFFOaX1v
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2264 powershell.exe 2604 powershell.exe 3048 powershell.exe 672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2264 powershell.exe Token: SeIncreaseQuotaPrivilege 2264 powershell.exe Token: SeSecurityPrivilege 2264 powershell.exe Token: SeTakeOwnershipPrivilege 2264 powershell.exe Token: SeLoadDriverPrivilege 2264 powershell.exe Token: SeSystemProfilePrivilege 2264 powershell.exe Token: SeSystemtimePrivilege 2264 powershell.exe Token: SeProfSingleProcessPrivilege 2264 powershell.exe Token: SeIncBasePriorityPrivilege 2264 powershell.exe Token: SeCreatePagefilePrivilege 2264 powershell.exe Token: SeBackupPrivilege 2264 powershell.exe Token: SeRestorePrivilege 2264 powershell.exe Token: SeShutdownPrivilege 2264 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeSystemEnvironmentPrivilege 2264 powershell.exe Token: SeRemoteShutdownPrivilege 2264 powershell.exe Token: SeUndockPrivilege 2264 powershell.exe Token: SeManageVolumePrivilege 2264 powershell.exe Token: 33 2264 powershell.exe Token: 34 2264 powershell.exe Token: 35 2264 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeIncreaseQuotaPrivilege 2604 powershell.exe Token: SeSecurityPrivilege 2604 powershell.exe Token: SeTakeOwnershipPrivilege 2604 powershell.exe Token: SeLoadDriverPrivilege 2604 powershell.exe Token: SeSystemProfilePrivilege 2604 powershell.exe Token: SeSystemtimePrivilege 2604 powershell.exe Token: SeProfSingleProcessPrivilege 2604 powershell.exe Token: SeIncBasePriorityPrivilege 2604 powershell.exe Token: SeCreatePagefilePrivilege 2604 powershell.exe Token: SeBackupPrivilege 2604 powershell.exe Token: SeRestorePrivilege 2604 powershell.exe Token: SeShutdownPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeSystemEnvironmentPrivilege 2604 powershell.exe Token: SeRemoteShutdownPrivilege 2604 powershell.exe Token: SeUndockPrivilege 2604 powershell.exe Token: SeManageVolumePrivilege 2604 powershell.exe Token: 33 2604 powershell.exe Token: 34 2604 powershell.exe Token: 35 2604 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeIncreaseQuotaPrivilege 3048 powershell.exe Token: SeSecurityPrivilege 3048 powershell.exe Token: SeTakeOwnershipPrivilege 3048 powershell.exe Token: SeLoadDriverPrivilege 3048 powershell.exe Token: SeSystemProfilePrivilege 3048 powershell.exe Token: SeSystemtimePrivilege 3048 powershell.exe Token: SeProfSingleProcessPrivilege 3048 powershell.exe Token: SeIncBasePriorityPrivilege 3048 powershell.exe Token: SeCreatePagefilePrivilege 3048 powershell.exe Token: SeBackupPrivilege 3048 powershell.exe Token: SeRestorePrivilege 3048 powershell.exe Token: SeShutdownPrivilege 3048 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeSystemEnvironmentPrivilege 3048 powershell.exe Token: SeRemoteShutdownPrivilege 3048 powershell.exe Token: SeUndockPrivilege 3048 powershell.exe Token: SeManageVolumePrivilege 3048 powershell.exe Token: 33 3048 powershell.exe Token: 34 3048 powershell.exe Token: 35 3048 powershell.exe Token: SeDebugPrivilege 672 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2264 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 28 PID 2336 wrote to memory of 2264 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 28 PID 2336 wrote to memory of 2264 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 28 PID 2336 wrote to memory of 2264 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 28 PID 2336 wrote to memory of 2604 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 31 PID 2336 wrote to memory of 2604 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 31 PID 2336 wrote to memory of 2604 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 31 PID 2336 wrote to memory of 2604 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 31 PID 2336 wrote to memory of 3048 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 33 PID 2336 wrote to memory of 3048 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 33 PID 2336 wrote to memory of 3048 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 33 PID 2336 wrote to memory of 3048 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 33 PID 2336 wrote to memory of 672 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 37 PID 2336 wrote to memory of 672 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 37 PID 2336 wrote to memory of 672 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 37 PID 2336 wrote to memory of 672 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 37 PID 2336 wrote to memory of 1088 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 39 PID 2336 wrote to memory of 1088 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 39 PID 2336 wrote to memory of 1088 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 39 PID 2336 wrote to memory of 1088 2336 139e2d5159fdbdec5850b66bca37b3e9.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\139e2d5159fdbdec5850b66bca37b3e9.exe"C:\Users\Admin\AppData\Local\Temp\139e2d5159fdbdec5850b66bca37b3e9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:1088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD576681680f50039a1e04caf406e1f40e6
SHA176f2b7000bf6ecd6565acfe4ab64d0e5d66fb4db
SHA2566e39fa87a8ca63e3a072f1b64b321bb138bf16726488b4d40509129d6569e749
SHA512d114ed1c6d7ea2b8f5518fd0e9bed25aa2aed77c72e04f056109542c18322bcced8d7d4ff85ea6bd8b6f009e196250463813033821876bd5caeb9908a4fa5cb2