Overview
overview
10Static
static
73f58da2e16...3f.exe
windows7-x64
103f58da2e16...3f.exe
windows10-2004-x64
10$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_32_/PowerRun64.exe
windows7-x64
4$_32_/PowerRun64.exe
windows10-2004-x64
3$_32_/SetACL64.exe
windows7-x64
1$_32_/SetACL64.exe
windows10-2004-x64
1$_32_/cabw...ws.exe
windows7-x64
1$_32_/cabw...ws.exe
windows10-2004-x64
1$_32_/p64.bat
windows7-x64
10$_32_/p64.bat
windows10-2004-x64
10$_32_/win_...rp.exe
windows7-x64
1$_32_/win_...rp.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 07:47
Behavioral task
behavioral1
Sample
3f58da2e1652dddab53995166f24993f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f58da2e1652dddab53995166f24993f.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$_32_/PowerRun64.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$_32_/PowerRun64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$_32_/SetACL64.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$_32_/SetACL64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$_32_/cabweejcuqvpws.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$_32_/cabweejcuqvpws.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$_32_/p64.bat
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$_32_/p64.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$_32_/win_version_csharp.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$_32_/win_version_csharp.exe
Resource
win10v2004-20240709-en
General
-
Target
$_32_/PowerRun64.exe
-
Size
923KB
-
MD5
efe5769e37ba37cf4607cb9918639932
-
SHA1
f24ca204af2237a714e8b41d54043da7bbe5393b
-
SHA256
5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2
-
SHA512
33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1
-
SSDEEP
24576:X2DW/xbMX2YIbxQsu3/PNLoQ+HyS2I4jRk:X2EgXoQsW/PNUQWnX4jRk
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CbsPersist_20240712074709.cab makecab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2632 PowerRun64.exe 600 PowerRun64.exe 600 PowerRun64.exe 1532 PowerRun64.exe 1532 PowerRun64.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2632 PowerRun64.exe 2572 PowerRun64.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 600 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 600 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 600 PowerRun64.exe Token: 0 600 PowerRun64.exe Token: SeDebugPrivilege 1532 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1532 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1532 PowerRun64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 600 2632 PowerRun64.exe 30 PID 2632 wrote to memory of 600 2632 PowerRun64.exe 30 PID 2632 wrote to memory of 600 2632 PowerRun64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe" /P:3937522⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:600 -
C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe" /P:3937523⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_32_\PowerRun64.exe" /TI/ /P:3937524⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2572
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240712074709.log C:\Windows\Logs\CBS\CbsPersist_20240712074709.cab1⤵
- Drops file in Windows directory
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c7a7aadd64f8dccd3c425cf4ab08d067
SHA1a836864e9a20294f9422c9404eef81e41c104e3c
SHA256161e5c35b796f2be52c326f3b96b2429b4dc22c03e9d9aaddefb00ea1ca72df5
SHA51287b2afefaffa3e5f999b545fb9354afc514b532cc7623297c75ecb88399a3a04436d892da537bf1a6b3e441b27915ad5f55fc9dc66b5e323fdedfb5bb4e52107
-
Filesize
81KB
MD5940b1915cadee0e2b33d80799816f6c7
SHA12c10e4fec3e8c054055d1ed78757117575f273f2
SHA25681e89e7266cfe5158e44f5578c8be61353e781daebdd47a33597e9ec503d379c
SHA512cc3c574fd5392c1b54146b591e22b1c01c95e34a602c403ad96c49b7ee6ad31d1478a00cc1334286addc5cb94496372a172745e9ad20554023e1e22c7da1e1c5
-
Filesize
25KB
MD5436c1bb98deeccecb73fad945f1dd3dc
SHA1774313ba911945589971bbc73498d81f060dabe6
SHA25605eae1691149cc66e458d5e5b4430bd3b938b278b8bdb2c887a13c9871004c51
SHA51266ea41b9b4a42f7c40d1ce5b6e82a6f03e8489648b912d96a81efa13d340d4d651078df7c1302c595ca83408e7208d1d79f02165dc27383952a9abe7f851c3e2