Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
I_DEC.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
I_DEC.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Fiskeeksporter/Lavningerne.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Fiskeeksporter/Lavningerne.ps1
Resource
win10v2004-20240226-en
General
-
Target
I_DEC.exe
-
Size
683KB
-
MD5
ecc6e9e230bcf7b188a046d8e6de9393
-
SHA1
e3077691c911ecfbd1770515d0056b6c6f772ceb
-
SHA256
f2684f314bd809180a5eab027fbe1e4fd685835770fb725cf6b03def71b5b732
-
SHA512
574441e32503a25ce690dcded7bfd6e61c62f32b7194c95f0377036a4acaa235323f10979d876a4666e6450307bd3972c06fe83c8a9d63b3a726156aa84e9b6e
-
SSDEEP
12288:FLTA8PHO5mU0It61O4Rc8xvbHje3mgSSBwlemT1vDfrYI3b:9TA8PO5mU161PFxvbS7w9p
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2852 powershell.exe 2800 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2852 set thread context of 2800 2852 powershell.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\navlebeskuer\candelabrums.lnk I_DEC.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\immaterialistic.man I_DEC.exe File opened for modification C:\Windows\resources\sylvies\skarksens.ini I_DEC.exe File opened for modification C:\Windows\Fonts\quietened\laar.Key219 I_DEC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2852 powershell.exe 2852 powershell.exe 2852 powershell.exe 2852 powershell.exe 2852 powershell.exe 2852 powershell.exe 2852 powershell.exe 2852 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2852 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2852 1724 I_DEC.exe 28 PID 1724 wrote to memory of 2852 1724 I_DEC.exe 28 PID 1724 wrote to memory of 2852 1724 I_DEC.exe 28 PID 1724 wrote to memory of 2852 1724 I_DEC.exe 28 PID 2852 wrote to memory of 2972 2852 powershell.exe 30 PID 2852 wrote to memory of 2972 2852 powershell.exe 30 PID 2852 wrote to memory of 2972 2852 powershell.exe 30 PID 2852 wrote to memory of 2972 2852 powershell.exe 30 PID 2852 wrote to memory of 2800 2852 powershell.exe 32 PID 2852 wrote to memory of 2800 2852 powershell.exe 32 PID 2852 wrote to memory of 2800 2852 powershell.exe 32 PID 2852 wrote to memory of 2800 2852 powershell.exe 32 PID 2852 wrote to memory of 2800 2852 powershell.exe 32 PID 2852 wrote to memory of 2800 2852 powershell.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\I_DEC.exe"C:\Users\Admin\AppData\Local\Temp\I_DEC.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -windowstyle hidden "$Nonadmissions=Get-Content 'C:\Users\Admin\AppData\Roaming\enomaniac\Fiskeeksporter\Lavningerne.All';$Adfrdsnormens=$Nonadmissions.SubString(57855,3);.$Adfrdsnormens($Nonadmissions)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵PID:2972
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5feae65ac76325264935f2c0be1a41bf0
SHA14a2cb34f83548a7d646efc2236d3e5aa8980a444
SHA25607543ac009938836ac7e42d5cd163ac76f6616699ef68869497b3689265a85db
SHA512189dbc8dd4a7df1c9f4de33b7808e78eaacc837d663d39dd3c748933071e33e0e996d4eb2241b83c94009df04aa0ccda9e1940165c1c1e979fd95d460bccd3ae
-
Filesize
336KB
MD509831adda0ad50be124381d5a4cf07ef
SHA164515a9e2378e73e512fc6ff2ad9695b033533d2
SHA256691d2bd85f0d441c5fdb2fa00a185494e11bea0b05b8fe88bafbd1fb6fc24006
SHA51227b7d2c70052bb5c62faeceb0699dee6ec78ec668d4041f9ebc4c6184166b3c83e94bd46d7ca7d7527ac43e60f7c598744a3692da177caa1223c138f87a38e65