Analysis
-
max time kernel
108s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
9fa06408f91e060c38950440ff7d7910N.exe
Resource
win7-20240708-en
General
-
Target
9fa06408f91e060c38950440ff7d7910N.exe
-
Size
701KB
-
MD5
9fa06408f91e060c38950440ff7d7910
-
SHA1
fddc5c83446ed362df9b40e411f416c25e276681
-
SHA256
3416c897b65b6ab2cd89b93dbd0acd53c0aef2590182fdbcce61b6024bf2a232
-
SHA512
0a3910c351b7827d92166e0262fde679c0707febb111a9600a603d7687c9165d0dee68543162b57e7c7d495d0a5b6f47a2e0f61119f08ad57589286d6b5e523a
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2556 powershell.exe 1208 powershell.exe 3248 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fa06408f91e060c38950440ff7d7910N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2556 powershell.exe 2556 powershell.exe 1208 powershell.exe 1208 powershell.exe 3248 powershell.exe 3248 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 884 9fa06408f91e060c38950440ff7d7910N.exe Token: SeDebugPrivilege 1208 powershell.exe Token: SeDebugPrivilege 3248 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 884 wrote to memory of 3356 884 9fa06408f91e060c38950440ff7d7910N.exe 86 PID 884 wrote to memory of 3356 884 9fa06408f91e060c38950440ff7d7910N.exe 86 PID 884 wrote to memory of 3356 884 9fa06408f91e060c38950440ff7d7910N.exe 86 PID 3356 wrote to memory of 1064 3356 cmd.exe 88 PID 3356 wrote to memory of 1064 3356 cmd.exe 88 PID 3356 wrote to memory of 1064 3356 cmd.exe 88 PID 3356 wrote to memory of 2556 3356 cmd.exe 89 PID 3356 wrote to memory of 2556 3356 cmd.exe 89 PID 3356 wrote to memory of 2556 3356 cmd.exe 89 PID 3356 wrote to memory of 1208 3356 cmd.exe 93 PID 3356 wrote to memory of 1208 3356 cmd.exe 93 PID 3356 wrote to memory of 1208 3356 cmd.exe 93 PID 3356 wrote to memory of 3248 3356 cmd.exe 96 PID 3356 wrote to memory of 3248 3356 cmd.exe 96 PID 3356 wrote to memory of 3248 3356 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa06408f91e060c38950440ff7d7910N.exe"C:\Users\Admin\AppData\Local\Temp\9fa06408f91e060c38950440ff7d7910N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5d046b1ef4fd1f7648fd6cf2a114e9a22
SHA168442692dbcc631665cd3285b075bec930e9c09e
SHA2565833be2cdec0a1bb7dea3c18a419734a0e61fc04106214eeb2b9ecf6aba60335
SHA512c89f23bd311fd793b884c0e67b3341fc43e4c743c1c3f07c06340dc84a2b58cfa2c1bff2110389e0ffd8138b3de95e5d1d825d68f6ff82a1e288465fc9a33510
-
Filesize
18KB
MD527b8b15499f09abcfbbe3da6dfe089ef
SHA1547d46605a06b68c13d4c83a8743d33d6fd7a804
SHA256df9ed9d6c85f2ac24b46dbccbef010b8083d676c9ce7dc815f2c0055b628047b
SHA5127a3fb5b95d89654f92fe955fc529957afcc235813e5cd4a13494adaa8bd77298b519a792933773c719de01d35755a75ea3f6317bbdafc41af5e82f444bf05c62
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc