Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Melitta/Assonantic/evakueringsvelsers/Jakobskamp/Blyantstegninger.ps1
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Melitta/Assonantic/evakueringsvelsers/Jakobskamp/Blyantstegninger.ps1
Resource
win10v2004-20231222-en
General
-
Target
b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe
-
Size
575KB
-
MD5
46b01a46c54eae7a4a22df08acd2148d
-
SHA1
b68dd5edfa58283488c7de3eeed549cc2cf34ace
-
SHA256
b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4
-
SHA512
f2fc66d4ee5057e760ebc758d9b5b937f8ab070724bd0611c4458520c5c21a839e094ad06b5760c59167a88614d1afff5512ef5120237c1b89ab23032e9991e8
-
SSDEEP
12288:FmWRppHy/X3hRbetbLiiJTFoAtV9Tj20z168E7rg3ONKUH1:FmWRYhR6tbRJTFjTjxzk8QOyH1
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2976 b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe 3876 Mikrodatamatens.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\optugte\Supermand.Uns b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1196 powershell.exe 3876 Mikrodatamatens.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1196 set thread context of 3876 1196 powershell.exe 94 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\uptable.til b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe File created C:\Program Files (x86)\Oppida.lnk b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\Bernini229\zoophile.Dis b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000700000002312c-56.dat nsis_installer_1 behavioral2/files/0x000700000002312c-56.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1196 powershell.exe 1196 powershell.exe 1196 powershell.exe 1196 powershell.exe 1196 powershell.exe 1196 powershell.exe 1196 powershell.exe 1196 powershell.exe 1196 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1196 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1196 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1196 2976 b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe 84 PID 2976 wrote to memory of 1196 2976 b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe 84 PID 2976 wrote to memory of 1196 2976 b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe 84 PID 1196 wrote to memory of 3876 1196 powershell.exe 94 PID 1196 wrote to memory of 3876 1196 powershell.exe 94 PID 1196 wrote to memory of 3876 1196 powershell.exe 94 PID 1196 wrote to memory of 3876 1196 powershell.exe 94 PID 1196 wrote to memory of 3876 1196 powershell.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe"C:\Users\Admin\AppData\Local\Temp\b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Vandvrkerne=Get-Content 'C:\Users\Admin\AppData\Roaming\kolossens\livrente\markedsfringsomkostnings\Melitta\Assonantic\evakueringsvelsers\Jakobskamp\Blyantstegninger.Mum';$Blodsukkerets27=$Vandvrkerne.SubString(43740,3);.$Blodsukkerets27($Vandvrkerne)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Mikrodatamatens.exe"C:\Users\Admin\AppData\Local\Temp\Mikrodatamatens.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD546b01a46c54eae7a4a22df08acd2148d
SHA1b68dd5edfa58283488c7de3eeed549cc2cf34ace
SHA256b2aedf1de53ed6e8b341efc26bfa06068a0c1dcfa04af94d998ced18546ad5d4
SHA512f2fc66d4ee5057e760ebc758d9b5b937f8ab070724bd0611c4458520c5c21a839e094ad06b5760c59167a88614d1afff5512ef5120237c1b89ab23032e9991e8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19
-
C:\Users\Admin\AppData\Roaming\kolossens\livrente\markedsfringsomkostnings\Accumulators\whitecup.Lak232
Filesize322KB
MD549ea58d683ec9e63e05e2af249e8b91c
SHA16715e873046f3240b1146e2c673707e707056c25
SHA25618c360deaefbe9621eb1ddbab7663852d8492eaf574cb8689e956fe662ea7e7c
SHA5125402ed9324788065c05d71cfc201659d83c9eb9506fd1f7deb76f53682de08d2521b9cf546b39cf3e83c44c780e86c9dfa1a0705a1c02139b8b9eac48469b045
-
C:\Users\Admin\AppData\Roaming\kolossens\livrente\markedsfringsomkostnings\Melitta\Assonantic\evakueringsvelsers\Jakobskamp\Blyantstegninger.Mum
Filesize42KB
MD5a986fd781b75d8deae5059a8eaf9947b
SHA100e654981fe37b648a5799c04856830d83345736
SHA256c2fb393897717d953dfd2ccfd179fccba1dbae00fa6c7a9ca46610b78b9ba085
SHA512ccc7b6aacc718ab09d871e933227d02299e9c9c119669f15804d988b46d7ba0db45aedf6d1a61f4844ec091d6a6e9ef3e0557b3c50420693453a2df59c4b2545