Overview
overview
7Static
static
3b4d1a384ce...fc.exe
windows7-x64
3b4d1a384ce...fc.exe
windows10-1703-x64
3b4d1a384ce...fc.exe
windows10-2004-x64
7b4d1a384ce...fc.exe
windows11-21h2-x64
3$_0_/paw.ps1
windows7-x64
3$_0_/paw.ps1
windows10-1703-x64
3$_0_/paw.ps1
windows10-2004-x64
3$_0_/paw.ps1
windows11-21h2-x64
3Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15/07/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
$_0_/paw.ps1
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$_0_/paw.ps1
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
$_0_/paw.ps1
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
$_0_/paw.ps1
Resource
win11-20240709-en
General
-
Target
b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe
-
Size
90KB
-
MD5
53fb50eee42db9b52aa73876c7e63528
-
SHA1
0f45f4a4e4cd72ef424dc2817f533fc4abbb63fc
-
SHA256
b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc
-
SHA512
2d0d9906d86b815865abf6e6a56800e35f3badc1710aee32325b235786e25a82f000b0179911d8cfcc53355c99fa73855e7c9ee85767c6e5e386cb00a828de1b
-
SSDEEP
1536:OPz4pageYCousZFCvcQHMX0D4C+cbObCB06+:kzkag2xnHpD4/cKbCu6+
Malware Config
Signatures
-
pid Process 4608 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4608 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4608 4740 b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe 72 PID 4740 wrote to memory of 4608 4740 b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe 72 PID 4740 wrote to memory of 4608 4740 b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe 72 PID 4608 wrote to memory of 5084 4608 powershell.exe 74 PID 4608 wrote to memory of 5084 4608 powershell.exe 74 PID 4608 wrote to memory of 5084 4608 powershell.exe 74 PID 5084 wrote to memory of 2280 5084 csc.exe 75 PID 5084 wrote to memory of 2280 5084 csc.exe 75 PID 5084 wrote to memory of 2280 5084 csc.exe 75 PID 4608 wrote to memory of 836 4608 powershell.exe 76 PID 4608 wrote to memory of 836 4608 powershell.exe 76 PID 4608 wrote to memory of 836 4608 powershell.exe 76 PID 836 wrote to memory of 4376 836 csc.exe 77 PID 836 wrote to memory of 4376 836 csc.exe 77 PID 836 wrote to memory of 4376 836 csc.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe"C:\Users\Admin\AppData\Local\Temp\b4d1a384ce4dd9d1804df4ff0cf5768f416fd658c3f648f334f68d040cfe53fc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\Unity\paw.ps1"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5se4ziwj\5se4ziwj.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6DFC.tmp" "c:\Users\Admin\AppData\Local\Temp\5se4ziwj\CSC522CBB12F302420FBE75E7B58CE571E8.TMP"4⤵PID:2280
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ih5k4nux\ih5k4nux.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6F44.tmp" "c:\Users\Admin\AppData\Local\Temp\ih5k4nux\CSC4CE4B21E835A4967B6AC579819D8A32.TMP"4⤵PID:4376
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fbc1676d9e4ec98bdaef15274f44c9ee
SHA1611c80abea60399a3d93230922a5f62d82177c59
SHA256ee6a2a0389aabbce1711860a8cbcf8bd8cfb820e98417de716794c790d8356e0
SHA512b5be0b3931bfaac5512e09dbe7758fc0eb8b1acc9f5dabc827cf56c3f1241c635ac826f7070549bdca31e09e5c099fca257828a0c232ed3ea0305d041e5cecad
-
Filesize
1KB
MD5546bc822c967167292e302ed2b7f31eb
SHA1332f0da4a9f59da6f69e95ee00069b475561f3be
SHA2563197d670382b6aa4a572854e96ff100fed461299fd94f4b2df73353ed730aa94
SHA512c3ff901c7746ed0b23f441987886282cf3a54da25f3063136d9fff666b1ab1e2951fa5d6b102d8ff1f8540e72045e129e1bb2e7d15a13a575eb1e24aa095387e
-
Filesize
1KB
MD5b524902f321e1e97a3acd70ca86eb447
SHA17607b2b0b8a9c7fc91e53e67056de99a6399b071
SHA256352bb300f20708ad8b0a1b13d7c94d599d92a79adb8037f99b3d86d479f92cc1
SHA51250e6065e79ac14d352aee52840894660353441089f80cbc07f6c2ce7fa2f45312f66be9a6d533a366887b6ecb31fefa816344f103f0ba0d8aa886784642f614b
-
Filesize
27KB
MD500edf5404b5d93b75a3a6dafc4da1d37
SHA156a5f0aec4ee03a1f8d0c8efc4b4cd9fa427efc8
SHA256c279e78306f5f6dd14d70267c95bdedb5779041f5b629323ecaddb146a249147
SHA512c103e30ced01ec046a2e2e9b2337dea5a10950aa0b35c306f1b089033f8a5a15152dfd0b60e407a4952a8e99c2796d4035b9d5a419525dd1c4e1d95ba71cbf91
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD5bd1a26f51426dff13d0c19f157f0e44f
SHA1fab05393a2755142a5798a00af4bd9a260042a34
SHA2569c5f1e2de3c603623d7f8e270b61dd684f53004c484093356111313d9cef9227
SHA512bd636382647b81832a1b744bf672d309e664af6930dc72774610b09b7622b2f16728d9d406f86fac707d38aed7c652a0d9b61636beb5b8fc6e4b8d4d8a8a01f8
-
Filesize
298B
MD5d2dd7b143c5631aa598407bbe81ef5db
SHA1a5c77b81db6300d7a7eb424875c96e2611d42d83
SHA256b3ccd5d9083909c89f8201c421434ec38280c051597b5414559c1df7fcf31cfe
SHA512bd2cc89e16b2d9ffee6e8e32c9474acd2ba1f9db187b26aa0c9dbde8b7e58476e96756cb6d6d46e8b18b7e1c936d4febc093196e690e35f2002c7da6331fbb62
-
Filesize
369B
MD5c6ef48de5a529e368f4715c1dfe6c2cb
SHA1d743adffc0ab5768690d4b76c193a37378812ad7
SHA2563c60a2fd55b932ba7a4a0282670ad1109f707da2e069c884be04d979d7d8f8f1
SHA512c1ca524c2198089bb93abf72bc630ffae423222a1c2342f9f2a0ee05dd7e1a69091bb43f86f4cc62110bbcf5f2adb6b224a140485603328695a46247d2d74aea
-
Filesize
652B
MD555958c9f622b69b6039bb1d58d627fc1
SHA1ce7135ba2faee19792c9d4387aa9ac31029c9ee5
SHA25650d37173685927c18c45f88e206afaac363b1e6b81de69894ea81a3e8363e8b6
SHA51263d61376eef7a7545827ed8ae855afe0ffee90f62c5e169139ada5b0ec7f75a7f9ad04575b6565af151e6111a4cfe0df4ff0c24d12e0034e61f26373a3e3767c
-
Filesize
652B
MD5cb2e69d91e9b90507f8049dc7992d069
SHA1f4015203a4ac20ae10fc41e7de82e8ba4723c40f
SHA256db4ac951d60c7bd88779a2ba3db88b7a2c3210437d3fe0b1946df4f5b421ebc1
SHA512cf1db96a760d0e58951c6c24ab0b9aa516d30ec4726cfe5d8b27c7e76fd7c5948a779303ad35d0779612703d8798ca2de6a78f51bd67cf3fb85d3e3aa615e406
-
Filesize
304B
MD5fcbd1ccfa38961c170df85c57bfada4b
SHA110c4078035fe757b71eeb9485461aaf0361b1fe1
SHA2569012dc6d80e7a9aa0ab6d64b12d8ba708edd2f96891b8d0d9a5f32fb7104622d
SHA5127437dbaa7473b8f9187ace9a1ab27a48bff50d21f3e6b7e7aaaf29543801e26e4d6e226be926525898be7c59b0d866fe53d6c0d13170726e4e014c3290fff707
-
Filesize
369B
MD5b77b1d70cb4dbec390cfa8ee8a6a1157
SHA11b394115f0310dbd2fb81bb768407e00994a5dc4
SHA2567955aa3dbe4e95cb7878c1ef3e063c9c2e9ac3abf224941ca829fa97ba9890b1
SHA512afbc03c565b0468fcb18be3df4e94f7d8ae9804e02a3464556a1b763b670eba1dec0e94071f38ffb2a3c234a61a627c18c2b5fa1421b6b679a1aa619173a2df8