Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
DHL_M-002567436735845755676678877988975877.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
DHL_M-002567436735845755676678877988975877.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Forthteller/Fibrillationen52/Nonveracity/Kreolerne.ps1
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Forthteller/Fibrillationen52/Nonveracity/Kreolerne.ps1
Resource
win10v2004-20240419-en
General
-
Target
Forthteller/Fibrillationen52/Nonveracity/Kreolerne.ps1
-
Size
57KB
-
MD5
cef01801545d5b91580cd6a4a9273144
-
SHA1
4ba951133e407bd0d6b0447d216528200aff68b9
-
SHA256
f0f42ea894ea592f55fd42f05df638a1c0eb54f966671817ba67ac78d6da3345
-
SHA512
57a39ee84f50065923d8441539da07a6ee49cc9e75e32d4f5b293c7d5a40b5f0cdf9b2e63fa29fbb279c86ad800ff4e8b72ed524d849e0ca423e61d3d9e0ebca
-
SSDEEP
1536:L/LU8NrMkeSHgeclYZTQgE8fxuRkZFT1Y3a0cF:7LjrP4eSNBUYK7
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3000 powershell.exe 3000 powershell.exe 3000 powershell.exe 3000 powershell.exe 3000 powershell.exe 3000 powershell.exe 3000 powershell.exe 3000 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3000 powershell.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2088 3000 powershell.exe 29 PID 3000 wrote to memory of 2088 3000 powershell.exe 29 PID 3000 wrote to memory of 2088 3000 powershell.exe 29 PID 3000 wrote to memory of 2080 3000 powershell.exe 31 PID 3000 wrote to memory of 2080 3000 powershell.exe 31 PID 3000 wrote to memory of 2080 3000 powershell.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Forthteller\Fibrillationen52\Nonveracity\Kreolerne.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"2⤵PID:2088
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "3000" "1088"2⤵PID:2080
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed80d67bd7eea64b7d9311f1b5cb2633
SHA16121829544a061109dbcb3e459effd152bdddd65
SHA256d02f9342b08cc1816a0e221c12e8663a9c9494910768dbdf95415ec61257b0c1
SHA51267e1ac94d54d930ed1d241d33a0a3fe84964cb2dbada34fb5e5b77f30765ad471b8bedb362c2489cd3e46f0f775fb75a182e2aefd738b2eb826ab7436f8c6e34