Analysis
-
max time kernel
132s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Vaadomraadernes/Oilpaper/Mcens/fokusering/Drsalget.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Vaadomraadernes/Oilpaper/Mcens/fokusering/Drsalget.ps1
Resource
win10v2004-20240226-en
General
-
Target
Vaadomraadernes/Oilpaper/Mcens/fokusering/Drsalget.ps1
-
Size
56KB
-
MD5
beafe0ef9151f5c648d72af104138e55
-
SHA1
dd5307005999c525a7ae1a078f693edb8641b3c6
-
SHA256
563d93bcff692455852ef8163a9ffc651b5defa4473e82306d37e45e182e7ecc
-
SHA512
768dc7b63dd5efb2c391a50a76416f8153f826d462ddf592034634913437e3aa21be1dab8ba5feeaec695f514ae4042f4401658d2b51057897c4859a03f756c5
-
SSDEEP
1536:q3goIn4k04e2H/oCyxc2ulMNlqQmULJXIZCy0uDV2xhE:q3g9n5E2Hjh2uly+ULJ4p0uD8hE
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
pid Process 2192 powershell.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2192 powershell.exe 2192 powershell.exe 2192 powershell.exe 2192 powershell.exe 2192 powershell.exe 2192 powershell.exe 2192 powershell.exe 2192 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2192 powershell.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2572 2192 powershell.exe 29 PID 2192 wrote to memory of 2572 2192 powershell.exe 29 PID 2192 wrote to memory of 2572 2192 powershell.exe 29 PID 2192 wrote to memory of 2544 2192 powershell.exe 31 PID 2192 wrote to memory of 2544 2192 powershell.exe 31 PID 2192 wrote to memory of 2544 2192 powershell.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Vaadomraadernes\Oilpaper\Mcens\fokusering\Drsalget.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"2⤵PID:2572
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2192" "1088"2⤵PID:2544
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50620e6f7ae7402fa3a055002b72884e6
SHA116d7c16e052c310233e1fece468c5522638f9633
SHA256f85f14cdf583dc3b0855e503fbf2f3e19ae3ccb8f543cd77d1ed184f5d599ed6
SHA5125cee2e2897c335b07161473016f7f3a4c54e0ee3b6f979a11dd09ec7c0bac02911120ff87a207d3623149469708984ea9477e318d276bb6d2745ca7c312e8dc6