Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
General
-
Target
68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe
-
Size
488KB
-
MD5
6ff047f1181667ebef43b9fe8805f56a
-
SHA1
bfccf361769e5d0eae62c6b70d289692c0b849e7
-
SHA256
68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320
-
SHA512
a3e4861ef73655de7aba96101db5ca77ca355977d2b7d519afeb9f33ee6b554e466fbe4db970286ad6d8c3c395684ab8d4c67b6fb5013885a8ceb8d4dd4aea05
-
SSDEEP
12288:QM2yDfjsHiLaLyV+QzOIiQkkWpHadpdohI:rDYHOlOIiQnWp6dpy
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Loads dropped DLL 1 IoCs
Processes:
68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exepid process 2872 68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2584 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2584 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exedescription pid process target process PID 2872 wrote to memory of 2584 2872 68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe powershell.exe PID 2872 wrote to memory of 2584 2872 68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe powershell.exe PID 2872 wrote to memory of 2584 2872 68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe powershell.exe PID 2872 wrote to memory of 2584 2872 68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe"C:\Users\Admin\AppData\Local\Temp\68b2d98b149d4eb8bee52f7dad010fca5850a21c8e872783b18f2c414dc29320.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Jasigers=Get-Content 'C:\Users\Admin\AppData\Roaming\Grydeskeen146\sdfdsf\Huaca.dew';$Realismen=$Jasigers.SubString(54269,3);.$Realismen($Jasigers)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ac0f93b2dec82e9579bff14c8572a6c8
SHA16460244317cbb77e342adb3561ec3acb496c84d5
SHA2563aa8e0abadefea2de58281198acfe48713a1d5b43aea5619f563cea098e9fd34
SHA5128055a6af150c45547927499f9cbf645d7f39c8e4f9caff4726fd711d2401abca01a79837095e5752b9f57b06446973ea6506796f2223bdb0179243d6e0575bd2