Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
804e6c9e35ced60e4f63166b0b1e6431.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
804e6c9e35ced60e4f63166b0b1e6431.exe
Resource
win10v2004-20231215-en
General
-
Target
804e6c9e35ced60e4f63166b0b1e6431.exe
-
Size
404KB
-
MD5
804e6c9e35ced60e4f63166b0b1e6431
-
SHA1
0617a7247a93933fa72cc17a369467a393847734
-
SHA256
696f8a6a73cfa9a84daf49781b0bd93e3a6ce36cda1330450b511706983dccb4
-
SHA512
0db3813f8fc5df8ed83a93ba44927e7e8134b5c30a45bcb0f3d003f92a04ebbfb81310fa79481c583a05638ce5b0ed0dead9ec9c07d71cb0ed2a4a424e26c184
-
SSDEEP
12288:6aOR+AzP3tHBHxFnT+VQaL95JcrzQURul5lAbUJ8EVPG:6T8ATlBRkVz9IzjR6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1596 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1596 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
804e6c9e35ced60e4f63166b0b1e6431.exedescription pid process target process PID 1996 wrote to memory of 1596 1996 804e6c9e35ced60e4f63166b0b1e6431.exe powershell.exe PID 1996 wrote to memory of 1596 1996 804e6c9e35ced60e4f63166b0b1e6431.exe powershell.exe PID 1996 wrote to memory of 1596 1996 804e6c9e35ced60e4f63166b0b1e6431.exe powershell.exe PID 1996 wrote to memory of 1596 1996 804e6c9e35ced60e4f63166b0b1e6431.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\804e6c9e35ced60e4f63166b0b1e6431.exe"C:\Users\Admin\AppData\Local\Temp\804e6c9e35ced60e4f63166b0b1e6431.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windo 1 -noexit -exec bypass -file "C:\Users\Public\weHtmYs.ps1"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\weHtmYs.ps1Filesize
24KB
MD554c60141db7cc6351f76dd7fed19a575
SHA15336083aee420b40d3ebb3eab56a4afd7d0fc9bc
SHA256869f514fecc74a2444b49990f0a975c681af67b946a66c13af77d8bc14e45a11
SHA512a34157249f6b6f462c98cd587abdb9914e50515de5953197ee15fb81bd7b57ef48aff470fee806f258f34b1e29b56f521ac3eb092d678348bcc27f3de60e0f96
-
memory/1596-9-0x0000000001CA0000-0x0000000001CE0000-memory.dmpFilesize
256KB
-
memory/1596-6-0x0000000073310000-0x00000000738BB000-memory.dmpFilesize
5.7MB
-
memory/1596-7-0x0000000073310000-0x00000000738BB000-memory.dmpFilesize
5.7MB
-
memory/1596-8-0x0000000001CA0000-0x0000000001CE0000-memory.dmpFilesize
256KB
-
memory/1596-10-0x0000000001CA0000-0x0000000001CE0000-memory.dmpFilesize
256KB
-
memory/1596-12-0x0000000073310000-0x00000000738BB000-memory.dmpFilesize
5.7MB
-
memory/1596-13-0x0000000001CA0000-0x0000000001CE0000-memory.dmpFilesize
256KB
-
memory/1596-15-0x0000000001CA0000-0x0000000001CE0000-memory.dmpFilesize
256KB
-
memory/1596-14-0x0000000001CA0000-0x0000000001CE0000-memory.dmpFilesize
256KB
-
memory/1996-3-0x00000000744D0000-0x0000000074BBE000-memory.dmpFilesize
6.9MB
-
memory/1996-0-0x0000000000070000-0x00000000000DC000-memory.dmpFilesize
432KB
-
memory/1996-1-0x00000000744D0000-0x0000000074BBE000-memory.dmpFilesize
6.9MB