Analysis
-
max time kernel
114s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win11-20240709-en
General
-
Target
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
-
Size
488KB
-
MD5
60b3d713550cd09b16181971027e0df5
-
SHA1
b5ffb312af1ebc5afd7c7b839fcbd1abaece6503
-
SHA256
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86
-
SHA512
125132cceeb9256b6b64fcaf263187c218ec483296a7ab6cc820cb9ab4e096d0f8c9e064167df67c8fdb91cc9622021374629b8c6795e5d76de3a0c4781c6cab
-
SSDEEP
12288:R0NwzUrQ2sgRZFh/rRAgYBNL3bHGwkuDvU3BbG:fzSQ25NBONLLQLRC
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2696 powershell.exe -
Loads dropped DLL 6 IoCs
pid Process 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 2696 powershell.exe 2308 Paragraphia233.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Filmologs = "%heterogametism% -windowstyle minimized $Akkompagneredes=(Get-ItemProperty -Path 'HKCU:\\Plotinic\\').Vitaminerne;%heterogametism% ($Akkompagneredes)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 3 drive.google.com 5 drive.google.com 6 drive.google.com 7 drive.google.com 14 drive.google.com 17 drive.google.com 18 drive.google.com 13 drive.google.com 15 drive.google.com 16 drive.google.com 22 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2696 powershell.exe 2308 Paragraphia233.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 2308 2696 powershell.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x002f000000019266-40.dat nsis_installer_1 behavioral1/files/0x002f000000019266-40.dat nsis_installer_2 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2732 reg.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E5CB7295894E64DA3752481813976D7EB632A2E0\Blob = 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 Paragraphia233.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E5CB7295894E64DA3752481813976D7EB632A2E0\Blob = 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 Paragraphia233.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E5CB7295894E64DA3752481813976D7EB632A2E0\Blob = 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 Paragraphia233.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E5CB7295894E64DA3752481813976D7EB632A2E0\Blob = 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 Paragraphia233.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E5CB7295894E64DA3752481813976D7EB632A2E0 Paragraphia233.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2696 powershell.exe 2696 powershell.exe 2696 powershell.exe 2696 powershell.exe 2696 powershell.exe 2696 powershell.exe 2696 powershell.exe 2696 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2696 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 30 PID 1988 wrote to memory of 2696 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 30 PID 1988 wrote to memory of 2696 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 30 PID 1988 wrote to memory of 2696 1988 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 30 PID 2696 wrote to memory of 2308 2696 powershell.exe 33 PID 2696 wrote to memory of 2308 2696 powershell.exe 33 PID 2696 wrote to memory of 2308 2696 powershell.exe 33 PID 2696 wrote to memory of 2308 2696 powershell.exe 33 PID 2696 wrote to memory of 2308 2696 powershell.exe 33 PID 2696 wrote to memory of 2308 2696 powershell.exe 33 PID 2308 wrote to memory of 1140 2308 Paragraphia233.exe 34 PID 2308 wrote to memory of 1140 2308 Paragraphia233.exe 34 PID 2308 wrote to memory of 1140 2308 Paragraphia233.exe 34 PID 2308 wrote to memory of 1140 2308 Paragraphia233.exe 34 PID 1140 wrote to memory of 2732 1140 cmd.exe 36 PID 1140 wrote to memory of 2732 1140 cmd.exe 36 PID 1140 wrote to memory of 2732 1140 cmd.exe 36 PID 1140 wrote to memory of 2732 1140 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe"C:\Users\Admin\AppData\Local\Temp\21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Sludrebttes113=Get-Content 'C:\Users\Admin\AppData\Local\kilns\Unobtainably\Hormonbalance\Impoverishes.Skj';$Dissimileres198=$Sludrebttes113.SubString(59295,3);.$Dissimileres198($Sludrebttes113)"2⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Paragraphia233.exe"C:\Users\Admin\AppData\Local\Temp\Paragraphia233.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Filmologs" /t REG_EXPAND_SZ /d "%heterogametism% -windowstyle minimized $Akkompagneredes=(Get-ItemProperty -Path 'HKCU:\Plotinic\').Vitaminerne;%heterogametism% ($Akkompagneredes)"4⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Filmologs" /t REG_EXPAND_SZ /d "%heterogametism% -windowstyle minimized $Akkompagneredes=(Get-ItemProperty -Path 'HKCU:\Plotinic\').Vitaminerne;%heterogametism% ($Akkompagneredes)"5⤵
- Adds Run key to start application
- Modifies registry key
PID:2732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD56bec9c5534eb1f475e02527356576362
SHA1b1766b4b752233ea7d31eccd59e877ad0df46654
SHA256261b0be710c8d1692957a8964538011f22dc90177c643bb97fb24f0c341a4d33
SHA5126bf92642cd5431c997855ed9c9a6cc2acd057ec002297f44e6a3607596d58d9727a2079655a3ccbd1566e18010f30c1cc39751235a86cb485e0f4d589ac89a6c
-
Filesize
71KB
MD53caa4ac857f4a0000da1b905a819ae72
SHA1bc1bd3a4b5a1b37c1b213d05c9ed8c472a818949
SHA2560d92f75f821620f9df25844a0b43c2be5763799f32a61c68f9baeeebe45560fc
SHA512abe4ec64665c8bc701219fae130e25073a4c76a98dd36cb5dd29e1eefc5d7ceb40e3d0e37dc7d1b2d3d84c4e38437883c09a6523c0d3393730659b220aac8e83
-
Filesize
488KB
MD560b3d713550cd09b16181971027e0df5
SHA1b5ffb312af1ebc5afd7c7b839fcbd1abaece6503
SHA25621a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86
SHA512125132cceeb9256b6b64fcaf263187c218ec483296a7ab6cc820cb9ab4e096d0f8c9e064167df67c8fdb91cc9622021374629b8c6795e5d76de3a0c4781c6cab
-
Filesize
7KB
MD5521df745a41f0b8164ffd01717cacbba
SHA1dc7a9eacfbeb1fae52091da5e80db6cb1b6bce74
SHA256dbf91707fa157603bea025a6411cdcb497ab11262c9c18b14dc431a45aa17c0b
SHA512c5b1ba062872a8f534e2f0eac57fc3c0d8be9cda79605d86566d67260ba5477444a0ddfed1838b4fb14c677e5342c8419a88fcd38147dbaa36ac1f9e00c52bbe
-
Filesize
4KB
MD5acbda33dd5700c122e2fe48e3d4351fd
SHA12c154baf7c64052ee712b7cdf9c36b7697dd3fc8
SHA256943b33829f9013e4d361482a5c8981ba20a7155c78691dbe02a8f8cd2a02efa0
SHA512d090adf65a74ac5b910b18bb67e989714335e7b4778cd771cff154d7186351a1bebbc7103cca849bdfa2709c991947ffff6c1d8fdf16a74f4dfb614bce3ff6fd
-
Filesize
9KB
MD51c8b2b40c642e8b5a5b3ff102796fb37
SHA13245f55afac50f775eb53fd6d14abb7fe523393d
SHA2568780095aa2f49725388cddf00d79a74e85c9c4863b366f55c39c606a5fb8440c
SHA5124ff2dc83f640933162ec8818bb1bf3b3be1183264750946a3d949d2e7068ee606277b6c840193ef2b4663952387f07f6ab12c84c4a11cae9a8de7bd4e7971c57