Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
202416484675.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
202416484675.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240412-en
General
-
Target
202416484675.exe
-
Size
573KB
-
MD5
37ffd710a4621907f505dd8395ad6ec5
-
SHA1
53740deecc632138495145b92e3480b24a354f29
-
SHA256
6adf0000974b83e3e0619e212b7a80935ad5612ae2217e4edc78073608ced002
-
SHA512
51e40d6cb916809559449f57aa4fdc056c20bb389df1baca2c2588ac84dc24b22a71664b51d6b5ed0738dc8e4c4f96fac09fcb343552d5f994effef520ad5b24
-
SSDEEP
12288:N9gnHh6aKgrxlF34fglEKH5D4g1x31UrnA0yESmLjPLoSBHi:8nHHxlFIfgltH5D1eA0xSeoSE
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1636 202416484675.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\besvigelsernes.pro 202416484675.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2376 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2376 1636 202416484675.exe 28 PID 1636 wrote to memory of 2376 1636 202416484675.exe 28 PID 1636 wrote to memory of 2376 1636 202416484675.exe 28 PID 1636 wrote to memory of 2376 1636 202416484675.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\202416484675.exe"C:\Users\Admin\AppData\Local\Temp\202416484675.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Unhypnotises=Get-Content 'C:\Users\Admin\AppData\Local\Temp\sammentrkkenes\petrochemical\pakken\Ecballium.Gen';$nonprosaic=$Unhypnotises.SubString(10542,3);.$nonprosaic($Unhypnotises)"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD598bdb37511634dad8d1236d91d373b26
SHA1778cf74b4f8860cc378fa4e61aeba318197783ce
SHA256938580b466533dfa1461e9858fd106b60e1a52b713380915cc03afd3e4b4573c
SHA5125a7a903c2346750f20c0b41ceb6259bc7a5c9c6779acfeef94e0cea756aebabef58fdd83389353a165530279ec74ff20b903fc9a11acf475ef9471bd5e8d140e