Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a861dc6c86df23a36ef912e89ce3d5ae4e8b8178df3d74b4a58d9f9706d5047.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Hingstplag/Derogatory/Obstinative/Stinkdyrene/Usikkerhedsmomenterne.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Hingstplag/Derogatory/Obstinative/Stinkdyrene/Usikkerhedsmomenterne.ps1
Resource
win10v2004-20240426-en
General
-
Target
Hingstplag/Derogatory/Obstinative/Stinkdyrene/Usikkerhedsmomenterne.ps1
-
Size
58KB
-
MD5
f75f469413f7ee4a1aa5684598b21dc2
-
SHA1
9ced6780f56759a64019fb90f02323382b7d37b8
-
SHA256
995bc94d2131edcae86c7d3f939a54a0f75f48eceee27633a43a502f4c3d4c21
-
SHA512
19a0745c7ce6a2294fcf9de80996dc7e2898401f69f88d7f1373d718655bcfbb0fec04585dddce0971d5a3acf339ed9e64a3d9783d221dbaec5ac3347b42b568
-
SSDEEP
1536:Yl/yZLz7GcmZf1ae0zqow0gP/o7GTKmnH:Yl/Ozqcmd9/w7GzH
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
pid Process 2768 powershell.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2768 powershell.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe Token: SeShutdownPrivilege 2572 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe 2572 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2960 2768 powershell.exe 29 PID 2768 wrote to memory of 2960 2768 powershell.exe 29 PID 2768 wrote to memory of 2960 2768 powershell.exe 29 PID 2768 wrote to memory of 2396 2768 powershell.exe 31 PID 2768 wrote to memory of 2396 2768 powershell.exe 31 PID 2768 wrote to memory of 2396 2768 powershell.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Usikkerhedsmomenterne.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"2⤵PID:2960
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2768" "1084"2⤵PID:2396
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5561b94a7020059af5217ba23c73d159b
SHA1245745315e3e35291afd1105c1a9131ccf98b7f3
SHA25606fc086e8fcf645f79078af7e49bc122e0473ecea3521fd27bbadd8367a7ece1
SHA512ae960184d9653ae0ae9f014ad4d2edc8a0f1a111fd43f744575b29867d9a85433cc495909b95b32bcdf0762f3a08a57a26bae0b11966129069e6a43545d5a40d