Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 01:00

General

  • Target

    a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71.exe

  • Size

    521KB

  • MD5

    0e1262a4ce5ac71ad5b8df93030d61b5

  • SHA1

    efb918ee62ff5cca7bdc10d180c7f7837c8e2b6b

  • SHA256

    a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71

  • SHA512

    a799094bdae022e92f77c002dc03d0da004982aaa973efe35dc6e72e40a5e9549927c7a831331218bb15478f24cc0b7ed9e7d94a0d1f3aba103b49e68bd0064d

  • SSDEEP

    12288:fzA/ggggjrBj93vPbk8tGtP7ocMzAGrP+jp:U/ggggj9jpvY84mAGrPu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71.exe
    "C:\Users\Admin\AppData\Local\Temp\a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Bromslvs=Get-Content 'C:\Users\Admin\AppData\Roaming\skabiose\slgtsarvens\prender\Kursusplans.Fje';$Oxyphosphate=$Bromslvs.SubString(61080,3);.$Oxyphosphate($Bromslvs)"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
        3⤵
          PID:4204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 2300
          3⤵
          • Program crash
          PID:760
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1628 -ip 1628
      1⤵
        PID:2960

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4qdjsi1t.0pd.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Roaming\skabiose\slgtsarvens\prender\Kursusplans.Fje

              Filesize

              59KB

              MD5

              867b6e69eaf64d49c92a00efe2f3484a

              SHA1

              57e409c3c4ec17f05de4b6900300c6ffb22447c7

              SHA256

              554a9d36104f6fe2c57ebef379f96adb5205f4652780c0459db40e676f5efa1c

              SHA512

              3d075d6850562b2f68503e48f9349a50dcf65e69626b85b5312bf0bd6938b3b433cafb3ed4f885b392c4157b6997613ea551729a35028f5be1151ac3feda1856

            • memory/1628-19-0x0000000005C90000-0x0000000005FE4000-memory.dmp

              Filesize

              3.3MB

            • memory/1628-23-0x0000000006330000-0x000000000634E000-memory.dmp

              Filesize

              120KB

            • memory/1628-10-0x0000000005A10000-0x0000000005A32000-memory.dmp

              Filesize

              136KB

            • memory/1628-11-0x0000000005BB0000-0x0000000005C16000-memory.dmp

              Filesize

              408KB

            • memory/1628-6-0x0000000004CD0000-0x0000000004D06000-memory.dmp

              Filesize

              216KB

            • memory/1628-12-0x0000000005C20000-0x0000000005C86000-memory.dmp

              Filesize

              408KB

            • memory/1628-7-0x00000000740B0000-0x0000000074860000-memory.dmp

              Filesize

              7.7MB

            • memory/1628-9-0x0000000005350000-0x0000000005978000-memory.dmp

              Filesize

              6.2MB

            • memory/1628-24-0x0000000006360000-0x00000000063AC000-memory.dmp

              Filesize

              304KB

            • memory/1628-25-0x00000000072D0000-0x0000000007366000-memory.dmp

              Filesize

              600KB

            • memory/1628-26-0x0000000006840000-0x000000000685A000-memory.dmp

              Filesize

              104KB

            • memory/1628-27-0x0000000006890000-0x00000000068B2000-memory.dmp

              Filesize

              136KB

            • memory/1628-28-0x0000000007920000-0x0000000007EC4000-memory.dmp

              Filesize

              5.6MB

            • memory/1628-8-0x0000000004D10000-0x0000000004D20000-memory.dmp

              Filesize

              64KB

            • memory/1628-30-0x0000000008550000-0x0000000008BCA000-memory.dmp

              Filesize

              6.5MB

            • memory/1628-32-0x00000000740B0000-0x0000000074860000-memory.dmp

              Filesize

              7.7MB