Analysis

  • max time kernel
    141s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 01:22

General

  • Target

    34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe

  • Size

    715KB

  • MD5

    8bf77ce63ca8a74cdb6f68e500a3c55c

  • SHA1

    acc29eb131fa05fc17cda4dd59f408f8549c2050

  • SHA256

    34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca

  • SHA512

    ef80bde286fe5c929745dff318a41abbe62fefeab88644ee306dfb8a47aed96b7f5a9d7da7e5b49cf50c01240c00655461367e9f48b5fea1359cbed82ebc7ce9

  • SSDEEP

    12288:CEto9B/yhu8eO1rj6FDexWeo9jUlo5i2j3Em88w1MHzNrK1T6Rdoh5OQ38GN:CXoEGZj6Frl9v5i2YmW1eWjOe8GN

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe
    "C:\Users\Admin\AppData\Local\Temp\34c4a0ba138c27572a6c7ef1af7dbdbcface5dcbe246f857e41516b8269b7fca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Retroclavicular=Get-Content 'C:\Users\Admin\AppData\Local\opbrusendes\traadormes\Retsvirkningslovs117\Morgendagen.geo';$Skillingsvisernes=$Retroclavicular.SubString(58311,3);.$Skillingsvisernes($Retroclavicular)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
        3⤵
          PID:2416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i53odyjg.sic.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\nse3931.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      b5a1f9dc73e2944a388a61411bdd8c70

      SHA1

      dc9b20df3f3810c2e81a0c54dea385704ba8bef7

      SHA256

      288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884

      SHA512

      b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8

    • C:\Users\Admin\AppData\Local\opbrusendes\traadormes\Retsvirkningslovs117\Morgendagen.geo

      Filesize

      56KB

      MD5

      d400d12fec01e36c194b26cd570d4b47

      SHA1

      cc1b547abcf98469a4b03f6ccff9e3b95e653280

      SHA256

      6ac24a0513e1d82bd32686be9f10834e40b6d80c3aff82056d5938e7d6891e44

      SHA512

      122388cfb7a7d779d62611bd8ecae3646db5de787a84435cde2401a1ac27788aa61c9fd7cf1182a9f313826fb58a3532150f8e519bed321c160a5fa291428f19

    • memory/2372-117-0x0000000005F80000-0x00000000062D4000-memory.dmp

      Filesize

      3.3MB

    • memory/2372-119-0x00000000065B0000-0x00000000065FC000-memory.dmp

      Filesize

      304KB

    • memory/2372-102-0x0000000005710000-0x0000000005D38000-memory.dmp

      Filesize

      6.2MB

    • memory/2372-105-0x0000000005680000-0x00000000056A2000-memory.dmp

      Filesize

      136KB

    • memory/2372-106-0x0000000005DB0000-0x0000000005E16000-memory.dmp

      Filesize

      408KB

    • memory/2372-107-0x0000000005F10000-0x0000000005F76000-memory.dmp

      Filesize

      408KB

    • memory/2372-104-0x0000000073F90000-0x0000000074740000-memory.dmp

      Filesize

      7.7MB

    • memory/2372-101-0x0000000002F60000-0x0000000002F96000-memory.dmp

      Filesize

      216KB

    • memory/2372-118-0x0000000006560000-0x000000000657E000-memory.dmp

      Filesize

      120KB

    • memory/2372-103-0x0000000073F90000-0x0000000074740000-memory.dmp

      Filesize

      7.7MB

    • memory/2372-122-0x0000000006AE0000-0x0000000006B02000-memory.dmp

      Filesize

      136KB

    • memory/2372-121-0x0000000006A90000-0x0000000006AAA000-memory.dmp

      Filesize

      104KB

    • memory/2372-120-0x0000000007810000-0x00000000078A6000-memory.dmp

      Filesize

      600KB

    • memory/2372-123-0x0000000007E60000-0x0000000008404000-memory.dmp

      Filesize

      5.6MB

    • memory/2372-100-0x0000000073F9E000-0x0000000073F9F000-memory.dmp

      Filesize

      4KB

    • memory/2372-125-0x0000000008A90000-0x000000000910A000-memory.dmp

      Filesize

      6.5MB

    • memory/2372-128-0x0000000073F9E000-0x0000000073F9F000-memory.dmp

      Filesize

      4KB

    • memory/2372-129-0x0000000073F90000-0x0000000074740000-memory.dmp

      Filesize

      7.7MB

    • memory/2372-130-0x0000000073F90000-0x0000000074740000-memory.dmp

      Filesize

      7.7MB