Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 15:56

General

  • Target

    4e984c829df56d7ec108cc19f3015e3c39ab0b0fdc9f11eaeeecb91d525db545.exe

  • Size

    990KB

  • MD5

    54e257b56a256a2f1b062d2cebda6b2d

  • SHA1

    4c4d8ddc6afce07f623b256fb21638cbdbd16144

  • SHA256

    4e984c829df56d7ec108cc19f3015e3c39ab0b0fdc9f11eaeeecb91d525db545

  • SHA512

    6f8e30f1b11fee49461691fd1d74de2dfe1c6f64c369d59632cb9e862ba3c3d0abab329e3134f5adcc066ee26f00f96ce303e1f5cdc318969698a7ce99261fce

  • SSDEEP

    24576:/4ezTAAfvu9z/4Jy7WjTfmzKnsWhegcKyJI:/4WAAfIgNjT+KnsWhegcXG

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e984c829df56d7ec108cc19f3015e3c39ab0b0fdc9f11eaeeecb91d525db545.exe
    "C:\Users\Admin\AppData\Local\Temp\4e984c829df56d7ec108cc19f3015e3c39ab0b0fdc9f11eaeeecb91d525db545.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Nondenunciation=Get-Content 'C:\Users\Admin\AppData\Local\skuespillerevnernes\Kilders219\Personalhistoriker\millionren.Non';$Tabinet=$Nondenunciation.SubString(50736,3);.$Tabinet($Nondenunciation)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
        3⤵
          PID:2812
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Dugens" /t REG_EXPAND_SZ /d "%Spontan59% -windowstyle minimized $Taarepersede=(Get-ItemProperty -Path 'HKCU:\Imbodying\').Swails;%Spontan59% ($Taarepersede)"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2380
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Dugens" /t REG_EXPAND_SZ /d "%Spontan59% -windowstyle minimized $Taarepersede=(Get-ItemProperty -Path 'HKCU:\Imbodying\').Swails;%Spontan59% ($Taarepersede)"
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:2432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\skuespillerevnernes\Kilders219\Personalhistoriker\millionren.Non

      Filesize

      49KB

      MD5

      80157482bbee05d39cc6eb150df00ee5

      SHA1

      541958b59d496ae8814c09336eda330993db754c

      SHA256

      4c2726ecd1f509ea66be91622735c2b9885c232c3b3733390e46d2859b2aed0b

      SHA512

      82f62f244fe0690c68b4eb983e1bd5ae421a5f10cf12d281a9dc167d9b99f60ea4dcac573f05626e5fc41ae50d18754029eae3f677806a83dfd7a801bda61c16

    • C:\Users\Admin\AppData\Local\skuespillerevnernes\Kilders219\Straalerne.Now

      Filesize

      299KB

      MD5

      74633979df571bd25e1c1e87f24becf7

      SHA1

      e2cb97f7015f6e49dde64f15f9c78607b32797e2

      SHA256

      a6bc8292d47989709e989e8f32243c7b42ca38879ec19ffec6376a69e2d0cf4f

      SHA512

      6dcae3ca303a709d3ad2e9c1ce90836ad84bdd49c5e0a78fc066c1e31493525a71f04b0a39e5593db953fe6f8c5e84b421a8c5a20814d01933c1bd41b1341f31

    • memory/2404-18-0x0000000000A50000-0x0000000001AB2000-memory.dmp

      Filesize

      16.4MB

    • memory/2460-8-0x0000000074121000-0x0000000074122000-memory.dmp

      Filesize

      4KB

    • memory/2460-12-0x0000000074120000-0x00000000746CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2460-11-0x0000000074120000-0x00000000746CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2460-10-0x0000000074120000-0x00000000746CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2460-9-0x0000000074120000-0x00000000746CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2460-16-0x00000000066F0000-0x000000000A647000-memory.dmp

      Filesize

      63.3MB

    • memory/2460-17-0x0000000074120000-0x00000000746CB000-memory.dmp

      Filesize

      5.7MB