Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
PowerRun.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PowerRun.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RemoveSecHealthApp.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RemoveSecHealthApp.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Script_Run.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Script_Run.bat
Resource
win10v2004-20241007-en
General
-
Target
PowerRun.exe
-
Size
873KB
-
MD5
fc1fb033d57f72089fb4762245a8b18d
-
SHA1
7ec0f7ca5f0e0d20e5372bf69865d0a809e6cc8e
-
SHA256
a6fa768c4964c328c748558627c20c2ba455e589a1b87cfa3911d197da1688d2
-
SHA512
cff3833e592a5fe1f1fcb656c42e77fdd177c902f84cf396365cfa04edc9ec046de3473a943779d3815bc36bf48182101703b20b08ae580c2b3ba20508d231d0
-
SSDEEP
24576:g2DW/xbWX2YIb3Qsu3/PNL3Q7HybtTpAA+c:g2EaXSQsW/PNjQLY9ARc
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CbsPersist_20241012151721.cab makecab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2728 PowerRun.exe 484 PowerRun.exe 484 PowerRun.exe 1920 PowerRun.exe 1920 PowerRun.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2728 PowerRun.exe 1728 PowerRun.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 484 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 484 PowerRun.exe Token: SeIncreaseQuotaPrivilege 484 PowerRun.exe Token: 0 484 PowerRun.exe Token: SeDebugPrivilege 1920 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 1920 PowerRun.exe Token: SeIncreaseQuotaPrivilege 1920 PowerRun.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2728 wrote to memory of 484 2728 PowerRun.exe 30 PID 2728 wrote to memory of 484 2728 PowerRun.exe 30 PID 2728 wrote to memory of 484 2728 PowerRun.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PowerRun.exe"C:\Users\Admin\AppData\Local\Temp\PowerRun.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\PowerRun.exe"C:\Users\Admin\AppData\Local\Temp\PowerRun.exe" /P:1316282⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484 -
C:\Users\Admin\AppData\Local\Temp\PowerRun.exe"C:\Users\Admin\AppData\Local\Temp\PowerRun.exe" /P:1316283⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\PowerRun.exe"C:\Users\Admin\AppData\Local\Temp\PowerRun.exe" /TI/ /P:1316284⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1728
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20241012151721.log C:\Windows\Logs\CBS\CbsPersist_20241012151721.cab1⤵
- Drops file in Windows directory
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD59e7bb9c31083cc3a0f561d12311c9d83
SHA19102b88339566d5f0490c25180632043c8bb1809
SHA2562658178fd2cb498195032c531bf3bb037954e0614aaec4c4ac2637f08d949bc1
SHA5121fb30279a1f951a98f609eb749deb6c77082c28a30e1fdd4f3224ddac8ddfad134e8f3c44f82c32501da8a93a978e6cf8dfe591039a0e6af0d4d2a1dc5445699
-
Filesize
28KB
MD51524a28cbc30e70c60bc6cf977f82229
SHA1664f15cea146b654ec4a60c76071ff83c4dfa651
SHA2568561191653adc4ee6cb03a5c1953bd993782689600adebcd8776754147668f9b
SHA5127fbee3bc38aca8ef368c1ff07eb1f4fb3f178628f8b41430eb1006c63bd908f26a1d85a19f2d661b02d3842505c9c762c8056fb2f1619b92a3a6d1085f0b9c50
-
Filesize
3KB
MD53c548fde7e314b4c03c43163f38dc00c
SHA152923ba3da93fa9c95b9b4c829c59f9b4ce77e54
SHA25608fef8dce972ff68a5c997d05029efffea2d58ac06911e3834b4631b0bc1f30e
SHA51250182a421b5c5f10a8ee789d9091d932f2d30dc65003dd0bbd58ab7b60d16645ab9e7f3ac35de2df1690cc397824f3d4ccafc21a020048d71f2a23ce4e353563
-
Filesize
11KB
MD54a83df1d945c2f5801ed59650d7460eb
SHA131827890e1df99268c0f80dcb26774225e4c3a5d
SHA2562d993be76dfcf35f89b656b4dbc553e078d824974b482e56c6f76eaea87731c8
SHA512eacb88683e3c999a1cdc9d9e4a4030723164e358d7cd85f7cfc02b99f33be991c89af5602349b48b5388520968a43a2a45b4b6d2f468f2b888088cf95bd591d2
-
Filesize
10KB
MD509ca17eb552722bd7004097f59b07518
SHA136cf9da188460542e58acb97fa0ef0bfd9a4e172
SHA256365c32c3c09228158ab5aaabfcf93cdfcd858be0b2a00031d82ab03070f61a5b
SHA5123dc6ed86df50f87b12635032fb30840e94bea699ac193a16099a2ce1a9bd5e39147f115fb938c177991dc0dcfd5abab075632a1d0b46e6009a86eea3a27156bf
-
Filesize
5KB
MD596c0e61f3298cb745b021f67e7dd0d48
SHA1a61adbe460c68a3087ff1ba75620dbb86af28e40
SHA2563e56c22a81ab1168036a289c7ffe2889dd678c422568dff9ef91d6a0f9005333
SHA512dbbfdd4ad2c80ff9df0b21dfd011420baba54a7114d0e0ff5371dda9c9389d90422a4311881ac2bdb5ba7c4334d210b61c6c0fc691ae503e32930109d9251f3e