Analysis
-
max time kernel
11s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/10/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
file.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
file.exe
Resource
win11-20241007-en
General
-
Target
file.exe
-
Size
791KB
-
MD5
5f9cb397c845f9e4b723575c20705c10
-
SHA1
8777fd75fe0058a5978780e6a4673b4759450eae
-
SHA256
110153fca09fa9761ba79b12aee86d8a0b13e28784d4186b2a8f65557381000c
-
SHA512
d6766f64e900499398392e65720ac51fb81ee1f6697cfe4f6e25231aa88b21dc16f76b466e84e3adea368d08ed21cdb84fa2014e47212c7a328e9d249fb9551f
-
SSDEEP
24576:ENQ//5PPhGNV4AiaaOu6+tHv0PTVbUkITUcU:ENm/5XhG34AiROuhtH8PveUc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3472 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3472 powershell.exe 3472 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3472 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3568 wrote to memory of 3472 3568 file.exe 77 PID 3568 wrote to memory of 3472 3568 file.exe 77 PID 3568 wrote to memory of 3472 3568 file.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Start-Sleep -Seconds 5; Remove-Item "C:\Users\Admin\AppData\Local\Temp\file.exe""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD56ad8ca0a895c031c6ec8c87bbe415d17
SHA12b5f3fe5e460573a61a2fa09af46579aa2387d8a
SHA256c611f992d3b667b2dabd535d0f4c72765c45fde63f63f6eefe45baeead737ed8
SHA512d5858a750cceeaef2b682d6ba874d51c8e484f71d505a1110af01dff4f6a75914bd4246c013aabde56a8ef27811bed8b6010b7e60b8f0424666ee1d12d66ad76
-
Filesize
4KB
MD522962f2697be4e30a28f995b8c9e00f8
SHA1c33bfa10c866562cce98312f5c806cafaea13d52
SHA25606e0d978d1fe08bd74e9bad97000ae891156f297b942522656e41d2aaaf7c6d2
SHA51259a23e72ed8fcea77dfa46a848e3826371d916e226e6594f827a6cdb86ab4ff7bf835a5255d043947b53e3a7ea15e35aae616dcd63bcea54643613005ab14199