Overview
overview
10Static
static
704995df8cb...e2.exe
windows7-x64
1004995df8cb...e2.exe
windows10-2004-x64
1014b162eed3...66.elf
debian-12-armhf
12cba66d97b...d8.exe
windows7-x64
102cba66d97b...d8.exe
windows10-2004-x64
102f84a18564...bc.elf
debian-12-armhf
1620c15ed6f...8a.elf
ubuntu-20.04-amd64
10623f93cf91...c8.wsf
windows7-x64
8623f93cf91...c8.wsf
windows10-2004-x64
870932cac71...1a.elf
debian-12-armhf
1CAHKHCM2404009CFS.exe
windows7-x64
10CAHKHCM2404009CFS.exe
windows10-2004-x64
10a552331bbe...60.elf
ubuntu-20.04-amd64
9b9d1e862b5...f4.exe
windows7-x64
10b9d1e862b5...f4.exe
windows10-2004-x64
4Michelines.ps1
windows7-x64
8Michelines.ps1
windows10-2004-x64
8f601a6e5b8...bc.elf
debian-12-armhf
Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 01:20
Behavioral task
behavioral1
Sample
04995df8cbeb0877d5721b8edecaf7d48154b17f8d0bfa61860beba48e30e0e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04995df8cbeb0877d5721b8edecaf7d48154b17f8d0bfa61860beba48e30e0e2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
14b162eed3f3f592b5bb6b6b86e817a81834301ce1fe3500a7c328e041a81f66.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral4
Sample
2cba66d97b8af051072417ad7267c9f56f8f74eca98a5e5bf5d7ddc894249ad8.exe
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
2cba66d97b8af051072417ad7267c9f56f8f74eca98a5e5bf5d7ddc894249ad8.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
2f84a18564ad0853e8c4853a610c42df170a3c0e50316ad65931201a727ff9bc.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral7
Sample
620c15ed6f68b42d2a3b708c340d9ccff7a9217f49ff11effabad58821c7c08a.elf
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral8
Sample
623f93cf915a4c7e840b51e912221354507f169f6f95121324b4018e33d0d5c8.wsf
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
623f93cf915a4c7e840b51e912221354507f169f6f95121324b4018e33d0d5c8.wsf
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
70932cac7130ce1561e74c534ba8db2589880a9858bd5b1de4683745576d1b1a.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
CAHKHCM2404009CFS.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
CAHKHCM2404009CFS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
a552331bbed7ca8a92633b6fcac504884d8a7bc54ce60618dd936f4aa8625560.elf
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral14
Sample
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
Michelines.ps1
Resource
win7-20231129-en
Behavioral task
behavioral17
Sample
Michelines.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
f601a6e5b8d78c1f32dbf5fe2cd18cee7ac598cd35fb7aba60526f4df95271bc.elf
Resource
debian12-armhf-20240221-en
General
-
Target
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe
-
Size
1.1MB
-
MD5
a0e9d68e9a8541eb30d6a31cae4a942b
-
SHA1
3cae987132d7f45df56f77c1ff2a542cb64e64c0
-
SHA256
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4
-
SHA512
eebfe98652f6b7dffb7e57bdd73c80c073f0f1879ee8a86c17054e1e1ecc3bf5dcec66b4619944659b9038ecfca19254fec0cb60c5264d905382acc8fb0ea03a
-
SSDEEP
24576:c0vvQvOM6sjFYk6IuhdTuvMJbmhQU/YydIE5Ltp:clvpN2zuvMxmhB/Ylyp
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
Processes:
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\Levantine.ini b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe -
Drops file in Windows directory 2 IoCs
Processes:
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exedescription ioc process File opened for modification C:\Windows\Fonts\tashlik.ini b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe File opened for modification C:\Windows\resources\0409\marmoreret.ini b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4608 2064 WerFault.exe powershell.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepid process 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2064 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exepowershell.exedescription pid process target process PID 1372 wrote to memory of 2064 1372 b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe powershell.exe PID 1372 wrote to memory of 2064 1372 b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe powershell.exe PID 1372 wrote to memory of 2064 1372 b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe powershell.exe PID 2064 wrote to memory of 764 2064 powershell.exe cmd.exe PID 2064 wrote to memory of 764 2064 powershell.exe cmd.exe PID 2064 wrote to memory of 764 2064 powershell.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe"C:\Users\Admin\AppData\Local\Temp\b9d1e862b5f864aab90e418632cf973132a4b4cbe4044b1fb997d9dfbd7ad0f4.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Bissede=Get-Content 'C:\Users\Admin\AppData\Local\nervier\Estampede\sipunculacean\Michelines.All';$Flumes35=$Bissede.SubString(58005,3);.$Flumes35($Bissede)"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 23243⤵
- Program crash
PID:4608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2064 -ip 20641⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
56KB
MD582340892cba1f6e4faaa080bb634cf9c
SHA156b029cbcada747897e9beff7c8f1013b8c9b6ce
SHA256a03bb54517df231824d324ad20b79094efef9af20eff855e30a6f459bcc43912
SHA512dfea5297d9aef9004af38f8604e74313f99d477199e797dbeec5367ec3e6c0000a4c62eeab54425deee14de5b1adb224f09956a10619cf03b821b2b91b84f5c7