Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
Overdue invoices.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Overdue invoices.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Udskriftsprogrammets152/endopterygote.com
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Udskriftsprogrammets152/endopterygote.com
Resource
win10v2004-20240508-en
General
-
Target
Overdue invoices.exe
-
Size
940KB
-
MD5
c7b087e71a071682a9b3db6c81933d71
-
SHA1
18aaa45e787e719b74e6d3e01d3cfbbbef4797ff
-
SHA256
9e7e7b336ebca231604ff7e00ac74974c885c0c27d7e671767e4f04655d42f44
-
SHA512
cbfc05afef4c590078e5fd9c429d45a4ae9b33e5cf3c4059fff2d7f9450d7b038682ce4188c8bfd99f5b4e1f26dbb97cd43067ee1eed837e94d3f660d12a97f0
-
SSDEEP
24576:owIC9jSMMMMMHLMMMMMMMMMMMMMoN8sLEACrlC9d1IKzMwESaUnrRbzIWF:FIC9jSMMMMMHLMMMMMMMMMMMMMy8sLEU
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1400 powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1400 powershell.exe 2808 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 2808 1400 powershell.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1400 powershell.exe 1400 powershell.exe 1400 powershell.exe 1400 powershell.exe 1400 powershell.exe 1400 powershell.exe 1400 powershell.exe 1400 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1400 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1400 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1400 2416 Overdue invoices.exe 28 PID 2416 wrote to memory of 1400 2416 Overdue invoices.exe 28 PID 2416 wrote to memory of 1400 2416 Overdue invoices.exe 28 PID 2416 wrote to memory of 1400 2416 Overdue invoices.exe 28 PID 1400 wrote to memory of 2728 1400 powershell.exe 30 PID 1400 wrote to memory of 2728 1400 powershell.exe 30 PID 1400 wrote to memory of 2728 1400 powershell.exe 30 PID 1400 wrote to memory of 2728 1400 powershell.exe 30 PID 1400 wrote to memory of 2808 1400 powershell.exe 32 PID 1400 wrote to memory of 2808 1400 powershell.exe 32 PID 1400 wrote to memory of 2808 1400 powershell.exe 32 PID 1400 wrote to memory of 2808 1400 powershell.exe 32 PID 1400 wrote to memory of 2808 1400 powershell.exe 32 PID 1400 wrote to memory of 2808 1400 powershell.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Overdue invoices.exe"C:\Users\Admin\AppData\Local\Temp\Overdue invoices.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Omphalopsychite=Get-Content 'C:\Users\Admin\AppData\Roaming\paeony\deputising\Genfremsttelserne\Udskriftsprogrammets152\Vernalizes.Unm';$Overherredmmerne=$Omphalopsychite.SubString(50910,3);.$Overherredmmerne($Omphalopsychite)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:2728
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\paeony\deputising\Genfremsttelserne\Udskriftsprogrammets152\Vernalizes.Unm
Filesize49KB
MD53c3d4c407384bb53c576b50c2af8bbef
SHA1148684cbcd0b18289ed12f32b12005b75f5ad2cb
SHA256254b0abed54dcce4cea7d28471894f133ebd9cbad49b93ee1efb1a0cc717aacd
SHA51298af0251d7e36fe8691a72bdf6ac24138f40ff4f18d458de5a2a691fdc6dd8bef984be89338bd94a3c4849aea3941f6aa639158e04da60f88688b4f376f0190b
-
C:\Users\Admin\AppData\Roaming\paeony\deputising\Genfremsttelserne\Udskriftsprogrammets152\nybygning.Nyn
Filesize337KB
MD549bd71b2fe0d79a738da25247b74cf1d
SHA1c960adb895de16014b32ce1eb64df735082f9cb8
SHA2564f7862531f398dbb81ae5a1388caa96dda5a5e5ab1d2771bc2c7d348dc64e544
SHA512daf0eb15a2f42eef300cc4acd9b7639f79e4168ef23ac75ec81062a0c69631747f9c2223cad65411b4c39e48be672a44d0b5b46da9034e18087f89b60457ba54