Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
po8909893299832.exe
Resource
win7-20240220-en
General
-
Target
po8909893299832.exe
-
Size
612KB
-
MD5
8c2635e6c2804ace5c6fa487f5e23a87
-
SHA1
334e05486efda6725b100a9365d5017aefb90e22
-
SHA256
d6c03cce5773652c4cb266084f901b331550d57a656240d20c288484657cd701
-
SHA512
25b40d504047bd3001303c59c72756d7174dc3b0e9731045e2a4cd57907333f4203ab8f2de3f4b99fb96c6ef5217dae764bfcca980583f7375a39714b78dffe6
-
SSDEEP
12288:xdJS4VayvR9/7MY12/bsozqhJf6fa8OGawEekrNYoAjjQkR:hScnpFxE/bsB3Si8OyTp3
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2396 powershell.exe 2860 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 3032 po8909893299832.exe 2860 powershell.exe 2396 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3032 po8909893299832.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2396 3032 po8909893299832.exe 30 PID 3032 wrote to memory of 2396 3032 po8909893299832.exe 30 PID 3032 wrote to memory of 2396 3032 po8909893299832.exe 30 PID 3032 wrote to memory of 2396 3032 po8909893299832.exe 30 PID 3032 wrote to memory of 2860 3032 po8909893299832.exe 32 PID 3032 wrote to memory of 2860 3032 po8909893299832.exe 32 PID 3032 wrote to memory of 2860 3032 po8909893299832.exe 32 PID 3032 wrote to memory of 2860 3032 po8909893299832.exe 32 PID 3032 wrote to memory of 2980 3032 po8909893299832.exe 33 PID 3032 wrote to memory of 2980 3032 po8909893299832.exe 33 PID 3032 wrote to memory of 2980 3032 po8909893299832.exe 33 PID 3032 wrote to memory of 2980 3032 po8909893299832.exe 33 PID 3032 wrote to memory of 2436 3032 po8909893299832.exe 36 PID 3032 wrote to memory of 2436 3032 po8909893299832.exe 36 PID 3032 wrote to memory of 2436 3032 po8909893299832.exe 36 PID 3032 wrote to memory of 2436 3032 po8909893299832.exe 36 PID 3032 wrote to memory of 2444 3032 po8909893299832.exe 37 PID 3032 wrote to memory of 2444 3032 po8909893299832.exe 37 PID 3032 wrote to memory of 2444 3032 po8909893299832.exe 37 PID 3032 wrote to memory of 2444 3032 po8909893299832.exe 37 PID 3032 wrote to memory of 1928 3032 po8909893299832.exe 38 PID 3032 wrote to memory of 1928 3032 po8909893299832.exe 38 PID 3032 wrote to memory of 1928 3032 po8909893299832.exe 38 PID 3032 wrote to memory of 1928 3032 po8909893299832.exe 38 PID 3032 wrote to memory of 1768 3032 po8909893299832.exe 39 PID 3032 wrote to memory of 1768 3032 po8909893299832.exe 39 PID 3032 wrote to memory of 1768 3032 po8909893299832.exe 39 PID 3032 wrote to memory of 1768 3032 po8909893299832.exe 39 PID 3032 wrote to memory of 2668 3032 po8909893299832.exe 40 PID 3032 wrote to memory of 2668 3032 po8909893299832.exe 40 PID 3032 wrote to memory of 2668 3032 po8909893299832.exe 40 PID 3032 wrote to memory of 2668 3032 po8909893299832.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\InXlDTKncKkCk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\InXlDTKncKkCk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD2BA.tmp"2⤵
- Creates scheduled task(s)
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"2⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"2⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"2⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"2⤵PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"C:\Users\Admin\AppData\Local\Temp\po8909893299832.exe"2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51321cc8e0adf4c62bc90a42694ed1d19
SHA11752a61d662aeca677bc8a1f2a36a7f6b972184e
SHA256f5f08fd45d8d9a341a22e5b77b03719bfc0d465bed40ae923d393a14599a0f1f
SHA512235805306039a152c33ec29700520800b5275ff68c10f4c09c4a9e1d8cbb76f5f3e04199f913303abad8f14122405bffb5a829ad99005dfe1adadacb780053f9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58eaec813e7cd56dba997e2667935cf44
SHA16a049d72c8285cf2d8256eebcd9ef3cc85eb4ad5
SHA2565545c5ad997c6ef44438b57a4a70db51588440fba13dd883b78a094cef26454d
SHA512def97824cbaf728352dd0c6055a982d2e74e3caf9c5f3869185b42620e83ee2ddc60bf09b9a90fb34c343a42a485311b175df1c2c19fd9a1c01d70b2d3818e41