Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
Resource
win11-20240709-en
General
-
Target
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe
-
Size
488KB
-
MD5
60b3d713550cd09b16181971027e0df5
-
SHA1
b5ffb312af1ebc5afd7c7b839fcbd1abaece6503
-
SHA256
21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86
-
SHA512
125132cceeb9256b6b64fcaf263187c218ec483296a7ab6cc820cb9ab4e096d0f8c9e064167df67c8fdb91cc9622021374629b8c6795e5d76de3a0c4781c6cab
-
SSDEEP
12288:R0NwzUrQ2sgRZFh/rRAgYBNL3bHGwkuDvU3BbG:fzSQ25NBONLLQLRC
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3060 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation Paragraphia233.exe -
Loads dropped DLL 5 IoCs
pid Process 4036 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 4036 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 4036 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 4036 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 3552 Paragraphia233.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Filmologs = "%heterogametism% -windowstyle minimized $Akkompagneredes=(Get-ItemProperty -Path 'HKCU:\\Plotinic\\').Vitaminerne;%heterogametism% ($Akkompagneredes)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 53 drive.google.com 18 drive.google.com 32 drive.google.com 51 drive.google.com 52 drive.google.com 39 drive.google.com 40 drive.google.com 41 drive.google.com 17 drive.google.com 21 drive.google.com 29 drive.google.com 31 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3060 powershell.exe 3552 Paragraphia233.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 3552 3060 powershell.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral3/files/0x000a00000001e5ff-61.dat nsis_installer_1 behavioral3/files/0x000a00000001e5ff-61.dat nsis_installer_2 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3504 reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3060 powershell.exe 3060 powershell.exe 3060 powershell.exe 3060 powershell.exe 3060 powershell.exe 3060 powershell.exe 3060 powershell.exe 3060 powershell.exe 3060 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4036 wrote to memory of 3060 4036 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 86 PID 4036 wrote to memory of 3060 4036 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 86 PID 4036 wrote to memory of 3060 4036 21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe 86 PID 3060 wrote to memory of 3552 3060 powershell.exe 89 PID 3060 wrote to memory of 3552 3060 powershell.exe 89 PID 3060 wrote to memory of 3552 3060 powershell.exe 89 PID 3060 wrote to memory of 3552 3060 powershell.exe 89 PID 3060 wrote to memory of 3552 3060 powershell.exe 89 PID 3552 wrote to memory of 2936 3552 Paragraphia233.exe 90 PID 3552 wrote to memory of 2936 3552 Paragraphia233.exe 90 PID 3552 wrote to memory of 2936 3552 Paragraphia233.exe 90 PID 2936 wrote to memory of 3504 2936 cmd.exe 92 PID 2936 wrote to memory of 3504 2936 cmd.exe 92 PID 2936 wrote to memory of 3504 2936 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe"C:\Users\Admin\AppData\Local\Temp\21a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Sludrebttes113=Get-Content 'C:\Users\Admin\AppData\Local\kilns\Unobtainably\Hormonbalance\Impoverishes.Skj';$Dissimileres198=$Sludrebttes113.SubString(59295,3);.$Dissimileres198($Sludrebttes113)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Paragraphia233.exe"C:\Users\Admin\AppData\Local\Temp\Paragraphia233.exe"3⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Filmologs" /t REG_EXPAND_SZ /d "%heterogametism% -windowstyle minimized $Akkompagneredes=(Get-ItemProperty -Path 'HKCU:\Plotinic\').Vitaminerne;%heterogametism% ($Akkompagneredes)"4⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Filmologs" /t REG_EXPAND_SZ /d "%heterogametism% -windowstyle minimized $Akkompagneredes=(Get-ItemProperty -Path 'HKCU:\Plotinic\').Vitaminerne;%heterogametism% ($Akkompagneredes)"5⤵
- Adds Run key to start application
- Modifies registry key
PID:3504
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD560b3d713550cd09b16181971027e0df5
SHA1b5ffb312af1ebc5afd7c7b839fcbd1abaece6503
SHA25621a7f19500a40c4302ccff91f9c4aa34b713cc07183cd83ca45852b6a00afd86
SHA512125132cceeb9256b6b64fcaf263187c218ec483296a7ab6cc820cb9ab4e096d0f8c9e064167df67c8fdb91cc9622021374629b8c6795e5d76de3a0c4781c6cab
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD5521df745a41f0b8164ffd01717cacbba
SHA1dc7a9eacfbeb1fae52091da5e80db6cb1b6bce74
SHA256dbf91707fa157603bea025a6411cdcb497ab11262c9c18b14dc431a45aa17c0b
SHA512c5b1ba062872a8f534e2f0eac57fc3c0d8be9cda79605d86566d67260ba5477444a0ddfed1838b4fb14c677e5342c8419a88fcd38147dbaa36ac1f9e00c52bbe
-
Filesize
4KB
MD5acbda33dd5700c122e2fe48e3d4351fd
SHA12c154baf7c64052ee712b7cdf9c36b7697dd3fc8
SHA256943b33829f9013e4d361482a5c8981ba20a7155c78691dbe02a8f8cd2a02efa0
SHA512d090adf65a74ac5b910b18bb67e989714335e7b4778cd771cff154d7186351a1bebbc7103cca849bdfa2709c991947ffff6c1d8fdf16a74f4dfb614bce3ff6fd
-
Filesize
9KB
MD51c8b2b40c642e8b5a5b3ff102796fb37
SHA13245f55afac50f775eb53fd6d14abb7fe523393d
SHA2568780095aa2f49725388cddf00d79a74e85c9c4863b366f55c39c606a5fb8440c
SHA5124ff2dc83f640933162ec8818bb1bf3b3be1183264750946a3d949d2e7068ee606277b6c840193ef2b4663952387f07f6ab12c84c4a11cae9a8de7bd4e7971c57
-
Filesize
325KB
MD56bec9c5534eb1f475e02527356576362
SHA1b1766b4b752233ea7d31eccd59e877ad0df46654
SHA256261b0be710c8d1692957a8964538011f22dc90177c643bb97fb24f0c341a4d33
SHA5126bf92642cd5431c997855ed9c9a6cc2acd057ec002297f44e6a3607596d58d9727a2079655a3ccbd1566e18010f30c1cc39751235a86cb485e0f4d589ac89a6c
-
Filesize
71KB
MD53caa4ac857f4a0000da1b905a819ae72
SHA1bc1bd3a4b5a1b37c1b213d05c9ed8c472a818949
SHA2560d92f75f821620f9df25844a0b43c2be5763799f32a61c68f9baeeebe45560fc
SHA512abe4ec64665c8bc701219fae130e25073a4c76a98dd36cb5dd29e1eefc5d7ceb40e3d0e37dc7d1b2d3d84c4e38437883c09a6523c0d3393730659b220aac8e83