Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 07:06

General

  • Target

    HSBC_PAYMENT.exe

  • Size

    838KB

  • MD5

    012a8c2d8d89f5a899644738b1dbeddf

  • SHA1

    0b2c6fdc0a100726884d239429fef4bba6208071

  • SHA256

    81645015b100a9f7759fa73ef49879ff9be5795c3b073516c3e1a040af057c7f

  • SHA512

    cd8968f5a4bcce5882d55f95361c3ea6889be04794ba93405bfc64c1881e607073ce20861b2bdafc3a10639ce87073a701148d6be040648ea98686aa2d078df5

  • SSDEEP

    24576:nYDoeMwkejuoLD9B9qwZXfOOu4WK7wZ36BDB:YdMErLRjqwZXmOH/7wZqBd

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT.exe
    "C:\Users\Admin\AppData\Local\Temp\HSBC_PAYMENT.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Strkeste=Get-Content 'C:\Users\Admin\AppData\Local\Temp\forgrovelse\konstituerendes\Starktlugtendes.Squ';$Inceptions=$Strkeste.SubString(71025,3);.$Inceptions($Strkeste) "
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Program Files (x86)\windows mail\wab.exe
        "C:\Program Files (x86)\windows mail\wab.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\forgrovelse\konstituerendes\Slamsugningernes190.Cra

    Filesize

    312KB

    MD5

    97b800ad73c8e49b2a66562d539b9032

    SHA1

    d51c32ef4749bd48b57bbee190a0df6c86041099

    SHA256

    467afaf1334cf744fb385926fad5e8e9c28bf83e7f12c7a62236aacce30b4aac

    SHA512

    3f4bb8811e996fb5ba0cc0735dd86d25103e77002a52847319006cc2b8f9c4c3a0cd18d43b7f928094433ec073bfa68e66d1e4b83e26161ee501f9cd42fe2ac7

  • C:\Users\Admin\AppData\Local\Temp\forgrovelse\konstituerendes\Starktlugtendes.Squ

    Filesize

    69KB

    MD5

    02a66897fdd3fb23fd89bcac42eb95ee

    SHA1

    149ac980d9f5b2fe93a111fad7df17f07e68221f

    SHA256

    4a2c5f33114580ac2b4923c96f0ec7505556604f8a8ff144450268beb15ffe99

    SHA512

    f80b924d0619aa7fba7f3a5a5d0242e0dc545c31bbc3aa632babbe16c51131a2c40fdb393d1d450c157d00cf018934c37905ccdb90b7bd9c783a3b2d5f90d679

  • memory/2920-7-0x0000000073D91000-0x0000000073D92000-memory.dmp

    Filesize

    4KB

  • memory/2920-8-0x0000000073D90000-0x000000007433B000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-9-0x0000000073D90000-0x000000007433B000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-10-0x0000000073D90000-0x000000007433B000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-11-0x0000000073D90000-0x000000007433B000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-14-0x0000000073D90000-0x000000007433B000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-16-0x0000000073D90000-0x000000007433B000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-17-0x0000000006560000-0x00000000092AA000-memory.dmp

    Filesize

    45.3MB

  • memory/2920-18-0x0000000073D90000-0x000000007433B000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-19-0x00000000006B0000-0x0000000001712000-memory.dmp

    Filesize

    16.4MB