Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Hingstplag/Derogatory/Obstinative/Stinkdyrene/Usikkerhedsmomenterne.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Hingstplag/Derogatory/Obstinative/Stinkdyrene/Usikkerhedsmomenterne.ps1
Resource
win10v2004-20240426-en
General
-
Target
8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe
-
Size
649KB
-
MD5
e6766a6f6aa24df00329fd135baee026
-
SHA1
9ebc9a61310473c70140a38be14cbe0debac1354
-
SHA256
8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047
-
SHA512
d458043be4e624d2d268d222ae4422e3137f85cff98745862b1b6c820e37138fcacdfc22f1fe3a3c6841d79390dc07e7a6fc8a062014cbca6df11f06a6514813
-
SSDEEP
12288:Eky/iqUIzivShD4AxYafSPiuGPQlXZyFaT6Rqot+xpEEUy96WPq6Ow6yv7C:8/iqUYivShDdYafuPXE2otKjVNPHqAC
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1008 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 4 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1008 powershell.exe 2776 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1008 set thread context of 2776 1008 powershell.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1008 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1008 1660 8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe 28 PID 1660 wrote to memory of 1008 1660 8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe 28 PID 1660 wrote to memory of 1008 1660 8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe 28 PID 1660 wrote to memory of 1008 1660 8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe 28 PID 1008 wrote to memory of 3032 1008 powershell.exe 30 PID 1008 wrote to memory of 3032 1008 powershell.exe 30 PID 1008 wrote to memory of 3032 1008 powershell.exe 30 PID 1008 wrote to memory of 3032 1008 powershell.exe 30 PID 1008 wrote to memory of 2776 1008 powershell.exe 32 PID 1008 wrote to memory of 2776 1008 powershell.exe 32 PID 1008 wrote to memory of 2776 1008 powershell.exe 32 PID 1008 wrote to memory of 2776 1008 powershell.exe 32 PID 1008 wrote to memory of 2776 1008 powershell.exe 32 PID 1008 wrote to memory of 2776 1008 powershell.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe"C:\Users\Admin\AppData\Local\Temp\8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Driftskapitals=Get-Content 'C:\Users\Admin\AppData\Local\Brugeruddannelsers219\uraniscochasma\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Usikkerhedsmomenterne.Sup';$Klydernes=$Driftskapitals.SubString(15921,3);.$Klydernes($Driftskapitals)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵PID:3032
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Brugeruddannelsers219\uraniscochasma\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Cisternernes.Iri
Filesize318KB
MD52eab73ee0b01fe66c73055c1c2fa4ade
SHA10f0e29a9db7f15372d4f0962fe3327449687103b
SHA256e8247d54cef465f896ad1430a812b7872c7cbcbccdddc95c3ab03027b5642a6c
SHA512afc3619d72b14320d45a9249a317ff5980036d6133615dc7158ba8583668a34ab2aef3edf31f866aef6cc22cd4acf1b54d0e1736acd3fea0676cbceb2b7846d4
-
C:\Users\Admin\AppData\Local\Brugeruddannelsers219\uraniscochasma\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Usikkerhedsmomenterne.Sup
Filesize58KB
MD5f75f469413f7ee4a1aa5684598b21dc2
SHA19ced6780f56759a64019fb90f02323382b7d37b8
SHA256995bc94d2131edcae86c7d3f939a54a0f75f48eceee27633a43a502f4c3d4c21
SHA51219a0745c7ce6a2294fcf9de80996dc7e2898401f69f88d7f1373d718655bcfbb0fec04585dddce0971d5a3acf339ed9e64a3d9783d221dbaec5ac3347b42b568