Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 01:37

General

  • Target

    8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe

  • Size

    649KB

  • MD5

    e6766a6f6aa24df00329fd135baee026

  • SHA1

    9ebc9a61310473c70140a38be14cbe0debac1354

  • SHA256

    8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047

  • SHA512

    d458043be4e624d2d268d222ae4422e3137f85cff98745862b1b6c820e37138fcacdfc22f1fe3a3c6841d79390dc07e7a6fc8a062014cbca6df11f06a6514813

  • SSDEEP

    12288:Eky/iqUIzivShD4AxYafSPiuGPQlXZyFaT6Rqot+xpEEUy96WPq6Ow6yv7C:8/iqUYivShDdYafuPXE2otKjVNPHqAC

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe
    "C:\Users\Admin\AppData\Local\Temp\8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Driftskapitals=Get-Content 'C:\Users\Admin\AppData\Local\Brugeruddannelsers219\uraniscochasma\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Usikkerhedsmomenterne.Sup';$Klydernes=$Driftskapitals.SubString(15921,3);.$Klydernes($Driftskapitals)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
        3⤵
          PID:3032
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Brugeruddannelsers219\uraniscochasma\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Cisternernes.Iri

      Filesize

      318KB

      MD5

      2eab73ee0b01fe66c73055c1c2fa4ade

      SHA1

      0f0e29a9db7f15372d4f0962fe3327449687103b

      SHA256

      e8247d54cef465f896ad1430a812b7872c7cbcbccdddc95c3ab03027b5642a6c

      SHA512

      afc3619d72b14320d45a9249a317ff5980036d6133615dc7158ba8583668a34ab2aef3edf31f866aef6cc22cd4acf1b54d0e1736acd3fea0676cbceb2b7846d4

    • C:\Users\Admin\AppData\Local\Brugeruddannelsers219\uraniscochasma\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Usikkerhedsmomenterne.Sup

      Filesize

      58KB

      MD5

      f75f469413f7ee4a1aa5684598b21dc2

      SHA1

      9ced6780f56759a64019fb90f02323382b7d37b8

      SHA256

      995bc94d2131edcae86c7d3f939a54a0f75f48eceee27633a43a502f4c3d4c21

      SHA512

      19a0745c7ce6a2294fcf9de80996dc7e2898401f69f88d7f1373d718655bcfbb0fec04585dddce0971d5a3acf339ed9e64a3d9783d221dbaec5ac3347b42b568

    • memory/1008-13-0x0000000006720000-0x000000000AF4B000-memory.dmp

      Filesize

      72.2MB

    • memory/2776-35-0x0000000000520000-0x0000000001582000-memory.dmp

      Filesize

      16.4MB