Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 07:14

General

  • Target

    Materien.exe

  • Size

    752KB

  • MD5

    da48313586a7ed35308c3d7b730be3a8

  • SHA1

    3ccfbbce591a3f16cc620984d2be7929fd7c69a5

  • SHA256

    802900953255394194cffac091a16c4edbee0cacb91ea43823ed2e36b5b4a3c4

  • SHA512

    5fc0666e58ff30541c5205de42009ca9340308dd3c664b9b1e28ebaffdb7ee2ed24ad584b1de2157472ef2ce172dc84fee0521d6729c7e8af27573eeae49a186

  • SSDEEP

    12288:jGHXvdN4G9MMe/OdNDqJ83eCOyGOs61IYZVAecgs9FMa1Mdq8jJa:juNNesNlLDGMIYO7MoOa

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Materien.exe
    "C:\Users\Admin\AppData\Local\Temp\Materien.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Totemistic=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Tillgspensionen.Ask';$Skomagermestrene=$Totemistic.SubString(54750,3);.$Skomagermestrene($Totemistic)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2248
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Totemistic=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Tillgspensionen.Ask';$Skomagermestrene=$Totemistic.SubString(54750,3);.$Skomagermestrene($Totemistic)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    e2f8420a97e2a29e6d0c7b39919cf898

    SHA1

    64048dedea3e94fa003cfec9a40ae4ab1ed99561

    SHA256

    056744db8e4b31cc348c7f1b5254898a02d03691cc1c92a25c3fd4e066a18eb2

    SHA512

    a40001e91a0e2005c23bcc900bb8cf24b4023ed8a440df4e3d8dc0707bb5ee1a9d237213aadef4b08560b9f3aad84b45b982141aacd774711ac04e952e1950ec