Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
88bdbcde8b2d570627dc08c006aa9636a69beb588c9a17e651ce783a7450f7f1.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
88bdbcde8b2d570627dc08c006aa9636a69beb588c9a17e651ce783a7450f7f1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Immatrikulerendes/Trogons.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Immatrikulerendes/Trogons.ps1
Resource
win10v2004-20231215-en
General
-
Target
Immatrikulerendes/Trogons.ps1
-
Size
53KB
-
MD5
5fd33bf891b22a73cefc7584dab237d7
-
SHA1
c6412a8f00de3c3bf551dc729aeaa95b29e06786
-
SHA256
f0a0b4b3cac5b00ba4d6c865ff4492e2aca2e7521e9da310866512e7ec06a8ad
-
SHA512
744b84aecc85f04f6203e40285bb716b6c24121ec0b2266ee938ddaa195e46d4fb710541f78fe79738e68faff7beb097505c3867f4eea5f90e3e873f2480d110
-
SSDEEP
768:+R6eAnbmQ3HJy8YHxGHCM4UZqOwxm3EIkTnHU7f10iEMwh7Z/yynItNa4mlWIN6+:+R6F7YHxG74UZ3557f19EXH/fOqJom3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2276 powershell.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2568 2276 powershell.exe 29 PID 2276 wrote to memory of 2568 2276 powershell.exe 29 PID 2276 wrote to memory of 2568 2276 powershell.exe 29 PID 2276 wrote to memory of 2384 2276 powershell.exe 31 PID 2276 wrote to memory of 2384 2276 powershell.exe 31 PID 2276 wrote to memory of 2384 2276 powershell.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Immatrikulerendes\Trogons.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"2⤵PID:2568
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2276" "1124"2⤵PID:2384
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509d7dcc714ffe5ca780519ddc133ba0b
SHA1d9b2b65eacca7cc802d0c12cddd8beff2939fce4
SHA2562b7d9b3ae2a01b9f7684fa31be0d8cecd7d298856fb2f059517d6f3ac20c2604
SHA512ee774a08eafd817fec6375f7d83faf65ef2ca75320684a5383566dffc6eaf016950695b10b0906fd86b64fe5c8968fbf20992f7316798a93ea8d62ea70148134