Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Accompanying/Fernanda/Typebetegnelsers/Surrounder189/Vorticular.ps1
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Accompanying/Fernanda/Typebetegnelsers/Surrounder189/Vorticular.ps1
Resource
win10v2004-20240226-en
General
-
Target
0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe
-
Size
629KB
-
MD5
b77e0b1deb6602a1c6029295114d91ea
-
SHA1
3142b6a4ae2481f9be71e7ea6f9abbedac914c08
-
SHA256
0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1
-
SHA512
5bb5b5e65e386180138bfddada07c08f759d35744a8014812bc9e7585582e9568cf66dcc06b9541de13f32a403961c48071af68c82dfbf8e1f5296cd82bc6c52
-
SSDEEP
12288:Zz64+JKNOfpUmvA4Bjfcg5jBfnvM/VWnA1gI0ZO0:84KJf4DcvM/4n20E0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2184 0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3044 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2184 0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3044 2184 0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe 28 PID 2184 wrote to memory of 3044 2184 0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe 28 PID 2184 wrote to memory of 3044 2184 0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe 28 PID 2184 wrote to memory of 3044 2184 0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe"C:\Users\Admin\AppData\Local\Temp\0254025b294133b4e71de66ad453e83f414ef6e5440f19e9017d26bc2ff2a2f1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Compital=Get-Content 'C:\Users\Admin\AppData\Local\forbitrendes\engines\fiefdoms\Accompanying\Fernanda\Typebetegnelsers\Surrounder189\Vorticular.Mel';$Kissejag=$Compital.SubString(58507,3);.$Kissejag($Compital)"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b55f7f1b17c39018910c23108f929082
SHA11601f1cc0d0d6bcf35799b7cd15550cd01556172
SHA256c4c6fe032f3cd8b31528d7b99661f85ee22cb78746aee98ec568431d4f5043f7
SHA512d652f2b09396ef7b9181996c4700b25840ceaa6c1c10080a55ce3db4c25d8d85f00a21e747f9d14a3374be4cdd4ea829a18d7de9b27b13b5e304447f3e9268fa