Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
ekstre.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ekstre.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Nonmental216/Midrange/avlstyrenes/Malasapsap/Dagenes.ps1
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Nonmental216/Midrange/avlstyrenes/Malasapsap/Dagenes.ps1
Resource
win10v2004-20231215-en
General
-
Target
ekstre.exe
-
Size
704KB
-
MD5
7817f076ff826896eea5d88826f1e0bf
-
SHA1
0706b2ecec41fe1af96790fe82d0ea746134da2a
-
SHA256
5806a9ff0ee5ef23fdb2d7cb9f12c3c0ab4b69b77eedf3aef2387672f8cce129
-
SHA512
8463f80871e07d3fe2232c0f4c17ef8b4752073bf718d92f2c711ea9cc9ab93f352234a89530628712cf796d1a2ec3fd79fa95b681458c04b6646ff9bb8a0b75
-
SSDEEP
12288:9cgybdNrgTB1myD5W3swba2cQxifyvYMaQyLi6R/LohEdIxL33vfy:9Sbd0PgDcYiqvYML3eU33Hy
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4060 ekstre.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Integrerings\Brstenbinderen.coa ekstre.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1156 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 1156 4060 ekstre.exe 84 PID 4060 wrote to memory of 1156 4060 ekstre.exe 84 PID 4060 wrote to memory of 1156 4060 ekstre.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ekstre.exe"C:\Users\Admin\AppData\Local\Temp\ekstre.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Delplans=Get-Content 'C:\Users\Admin\AppData\Roaming\vivisectible\Nonmental216\Midrange\avlstyrenes\Malasapsap\Dagenes.Ful';$Pseudocoele=$Delplans.SubString(43226,3);.$Pseudocoele($Delplans)"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5b55f7f1b17c39018910c23108f929082
SHA11601f1cc0d0d6bcf35799b7cd15550cd01556172
SHA256c4c6fe032f3cd8b31528d7b99661f85ee22cb78746aee98ec568431d4f5043f7
SHA512d652f2b09396ef7b9181996c4700b25840ceaa6c1c10080a55ce3db4c25d8d85f00a21e747f9d14a3374be4cdd4ea829a18d7de9b27b13b5e304447f3e9268fa
-
C:\Users\Admin\AppData\Roaming\vivisectible\Nonmental216\Midrange\avlstyrenes\Malasapsap\Dagenes.Ful
Filesize42KB
MD52fff737d32cd6ae12fd9f0f6eff695cc
SHA193006508926aedcc953721c6e32e5c3ef5518030
SHA2564dd97bef5427d351886f28613e7bf046849f21c3b3f22b66a397e217594483e4
SHA51253358f44ebce1ed85ef4fd20b28f569c7b3932daa75b56a58a379ebe7d9b962052c9747c4390908ea80a0d58165b3c43c7419ebbea0717744541aea3e13b058b