Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe
Resource
win10v2004-20240426-en
General
-
Target
51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe
-
Size
861KB
-
MD5
12e8a5c51d703480287ece311eccf19f
-
SHA1
e8a24456acca0940bfa2c20b2b1955c479a7de80
-
SHA256
51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5
-
SHA512
b369b54ab8433d963933603a556e177cad0d603a2a527f8ca0c2516520ae9cdf66d400f9595c66ef111badd4d8172be9d452ec1d5b67c26ad6f5086da5d88e4b
-
SSDEEP
12288:0cAw7NoOLMYUy9ykwdEmU9E+/BZEHCkg8Ta51XzK5olKV6:0Uw0UAEdgcmxzK5oD
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3192 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1964 3192 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3192 powershell.exe 3192 powershell.exe 3192 powershell.exe 3192 powershell.exe 3192 powershell.exe 3192 powershell.exe 3192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3192 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3192 2748 51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe 84 PID 2748 wrote to memory of 3192 2748 51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe 84 PID 2748 wrote to memory of 3192 2748 51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe 84 PID 3192 wrote to memory of 4284 3192 powershell.exe 86 PID 3192 wrote to memory of 4284 3192 powershell.exe 86 PID 3192 wrote to memory of 4284 3192 powershell.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe"C:\Users\Admin\AppData\Local\Temp\51f63b8248b7719fb54a6205d260a63077421f6acce4608fffc57dd081f3d2e5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Gestalte=cat 'C:\Users\Admin\AppData\Local\Temp\Landsforrderes\Bilge.Rek';$Shapy=$Gestalte.substring(78840,3);.$Shapy($Gestalte)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 25403⤵
- Program crash
PID:1964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3192 -ip 31921⤵PID:1756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD503355270674c4be3bf38bb1c56468d09
SHA19de14dfd8cd5292c917e19aedb40fb69d27f253e
SHA25641032364e0d45cb5c2841a51435a466b12503a93fc0700ac28ca685b342a7baa
SHA512e6b428b9071c79f76dbbe9dc3cf80e2134d022c1b1e075790517aa7554f12672ba0eb27e2f9a3be472c0b7da54f89d90d24eaa40d7041d57774f5bef6999a0ae
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82