Analysis
-
max time kernel
133s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7ab5280efdd1f09f7c15daafa507b5a889e30cb9bfa0060ae5cf29a64c9d410.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Reservebeholdninger.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Reservebeholdninger.ps1
Resource
win10v2004-20240412-en
General
-
Target
Reservebeholdninger.ps1
-
Size
58KB
-
MD5
a687f6d2ecff91aee4bd9e4d16a35089
-
SHA1
d2666e69bc1455afb305dc880889acedbd0fab03
-
SHA256
9667fc1a9915b7e9b53ec8d2d8711bf4855ca01420538e152e6f4624db54436c
-
SHA512
284b000a92f44c171188bf540f5fb36b564c0fbd381d548cd3cffc74efc43e8acdf12d7db2da4228d1bbcde1658c3136d989b9f0c70bcd1ecbae8276cba1c759
-
SSDEEP
1536:nEKsdqJnD8vjXSYoDO27FaOwfbUiemRLlvsbeeF5q2GY6E/0k5pS:nnsdqJD8vjXSY67F1wDUANuvN5s
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2868 powershell.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2528 2868 powershell.exe 29 PID 2868 wrote to memory of 2528 2868 powershell.exe 29 PID 2868 wrote to memory of 2528 2868 powershell.exe 29 PID 2868 wrote to memory of 2612 2868 powershell.exe 31 PID 2868 wrote to memory of 2612 2868 powershell.exe 31 PID 2868 wrote to memory of 2612 2868 powershell.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Reservebeholdninger.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"2⤵PID:2528
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2868" "1132"2⤵PID:2612
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54dd2f93ef2ed5315ccb748d29463be52
SHA1ae69f2da6e43bd92ca2ff6111864f58e8995c2da
SHA2564a5cfe4b7a6e018ad3c4d8d6067a20c314485ba817d3a304f6f6903eb9600141
SHA512a9f8172de20d5b131a5306abd5224784bd79b1cf90f3c6b3f694ef0b7a077fbc5e70bf754e298c66c9c64c839201a68d561f242e4511b57ae6f2f0bd788c8ad1