Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 14:35

General

  • Target

    3.exe

  • Size

    1.2MB

  • MD5

    ec91d57cb541b3d5867b4972b0883f44

  • SHA1

    77a05550a12646964b23404fca934e6dad232d6e

  • SHA256

    0d51cc75a747abb0b17f859c228b2c15dfea604e90172af3571aa78183a654e8

  • SHA512

    84c8d5cc8d5eaf91a5f7b25eca2d0916dad5c39da9d01375bf7d328c2f8251fad6d57700fa249de03876ffa463c6f85102aa796b02741cd3f6b2602e5a469b88

  • SSDEEP

    24576:IPty3zTcFJHXIh+8xHBe7JvIKSpcG/pQd:IPQ3zTUXMxHYYpcG/2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3.exe
    "C:\Users\Admin\AppData\Local\Temp\3.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle minimized "$Broses221=Get-Content 'C:\Users\Admin\AppData\Local\Slukredes\Geografiskes.Erf';$Mouseweb=$Broses221.SubString(54605,3);.$Mouseweb($Broses221)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nstE042.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    b38561661a7164e3bbb04edc3718fe89

    SHA1

    f13c873c8db121ba21244b1e9a457204360d543f

    SHA256

    c2c88e4a32c734b0cb4ae507c1a9a1b417a2375079111fb1b35fab23aedd41d9

    SHA512

    fedcaac20722de3519382011ccf22314af3edcd11b69f814db14710966853b69b9b5fc98383edcdb64d050ff825264eaba27b1c5adfe61d1fc9d77f13a052ced

  • memory/1896-12-0x0000000074551000-0x0000000074552000-memory.dmp

    Filesize

    4KB

  • memory/1896-13-0x0000000074550000-0x0000000074AFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1896-14-0x0000000074550000-0x0000000074AFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1896-15-0x0000000074550000-0x0000000074AFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1896-16-0x0000000074550000-0x0000000074AFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1896-17-0x0000000074550000-0x0000000074AFB000-memory.dmp

    Filesize

    5.7MB