Resubmissions

10-07-2024 12:57

240710-p6wwgsygrq 10

25-06-2024 02:41

240625-c6rwbawglf 10

Analysis

  • max time kernel
    194s
  • max time network
    287s
  • platform
    windows7_x64
  • resource
    win7-20240704-de
  • resource tags

    arch:x64arch:x86image:win7-20240704-delocale:de-deos:windows7-x64systemwindows
  • submitted
    10-07-2024 12:57

General

  • Target

    6cdb5689c39841cb71537410e90fcd6db86ef27dff8cf9eac5ac8122997f5b90.exe

  • Size

    421KB

  • MD5

    e62848b3576538fa77777032c232436b

  • SHA1

    0049ca2473da98bc37394d5bb4c05852356c8bcb

  • SHA256

    6cdb5689c39841cb71537410e90fcd6db86ef27dff8cf9eac5ac8122997f5b90

  • SHA512

    ded4ab36f0401e7330de3e0347328ff1218338388268e45f0f79e23d8c95ba22b6f1454e2f908952acee023d1e5087b47f0cc38e23e151e7130e385951043822

  • SSDEEP

    12288:sXLuBglhv+vNO6bVeKGA/Py3B1KuJ+NiKYU/d7tnUv:OLKgHv+vNOSV/vyrnKtF5Uv

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cdb5689c39841cb71537410e90fcd6db86ef27dff8cf9eac5ac8122997f5b90.exe
    "C:\Users\Admin\AppData\Local\Temp\6cdb5689c39841cb71537410e90fcd6db86ef27dff8cf9eac5ac8122997f5b90.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000003041\run.ps1"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2200

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000003041\run.ps1
    Filesize

    15KB

    MD5

    0fb684cc15d197c0b937e5528359d7c8

    SHA1

    7d963246f52f42012bdcddb31214283c84c954ed

    SHA256

    e767d70fc57483aae7a20cb094a9bfc1fd4f04e97fb772cd6892d057e5be4260

    SHA512

    c40335f72f802479dc0926704d87670a782362fedae5bb50179d427fc343c6a33cfe09f4640acb15624d1511d3d66f76d87f663f9ad430fc2ddb00c54056103c

  • memory/2200-24-0x00000000731E1000-0x00000000731E2000-memory.dmp
    Filesize

    4KB

  • memory/2200-25-0x00000000731E0000-0x000000007378B000-memory.dmp
    Filesize

    5.7MB

  • memory/2200-26-0x00000000731E0000-0x000000007378B000-memory.dmp
    Filesize

    5.7MB

  • memory/2200-27-0x00000000731E0000-0x000000007378B000-memory.dmp
    Filesize

    5.7MB

  • memory/2200-28-0x00000000731E0000-0x000000007378B000-memory.dmp
    Filesize

    5.7MB

  • memory/2200-30-0x00000000731E0000-0x000000007378B000-memory.dmp
    Filesize

    5.7MB