Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/10/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
REVISED INVOICE.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
REVISED INVOICE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Hyperclimax.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Hyperclimax.ps1
Resource
win10v2004-20241007-en
General
-
Target
REVISED INVOICE.exe
-
Size
983KB
-
MD5
8274b1a41b53bf35e0b4330a20010d4c
-
SHA1
0b263f01dd3e10389cd4fe6575d114ea301ee874
-
SHA256
d2320e5704e90bc713c59a0521bacf04ca5751c2481e1dd4e3a95494981d867c
-
SHA512
727ed4fe93c9f0da19df61b81d3f92a9ddc9b6680b2ac841e1ed3ed37bbbe7ecc4a628dfddf31429d2fb5034edd6bc7f742a84f6e76fe7f7401dcd98ea3ec644
-
SSDEEP
12288:KBu+je2mGYUNpeqzfAOKUXWkP/8KYfNrnEoYhJLAMhuwIm/toWyqTnoXnPolxsq8:D+63cWqv3nANr8xAGuwIm/yWiopvC9wG
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2500 powershell.exe 864 powershell.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Hemicrane.ini REVISED INVOICE.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\federalt\Telephonists230.Ube REVISED INVOICE.exe File opened for modification C:\Windows\resources\snagline.sub REVISED INVOICE.exe File created C:\Windows\resources\0409\syntonolydian\statsminister.lnk REVISED INVOICE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REVISED INVOICE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 powershell.exe 864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 864 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 804 wrote to memory of 2500 804 REVISED INVOICE.exe 31 PID 804 wrote to memory of 2500 804 REVISED INVOICE.exe 31 PID 804 wrote to memory of 2500 804 REVISED INVOICE.exe 31 PID 804 wrote to memory of 2500 804 REVISED INVOICE.exe 31 PID 804 wrote to memory of 864 804 REVISED INVOICE.exe 33 PID 804 wrote to memory of 864 804 REVISED INVOICE.exe 33 PID 804 wrote to memory of 864 804 REVISED INVOICE.exe 33 PID 804 wrote to memory of 864 804 REVISED INVOICE.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\REVISED INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\REVISED INVOICE.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Funktionserklringen=Get-Content -raw 'C:\Users\Admin\AppData\Local\fona\Kvit\Hyperclimax.Com';$Longers=$Funktionserklringen.SubString(56921,3);.$Longers($Funktionserklringen)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Funktionserklringen=Get-Content -raw 'C:\Users\Admin\AppData\Local\fona\Kvit\Hyperclimax.Com';$Longers=$Funktionserklringen.SubString(56921,3);.$Longers($Funktionserklringen)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852B
MD5f531f1b805017206cd3d0f52e088fbbf
SHA100eacc2e15236a38e743d0203493335c029d97ca
SHA2560b472228e563bfb78ab84bcee81c5e86bfb54ed3d24b1cef470c00d54c6d1a22
SHA512bceeb4c7dbcb458e42a923ed21f1e37a6404c75f7e76d43a0005bef21a9c6c7efc8e0b4aec8b301f98f8dc95e8e741dfa5bb86ace74548f56331e6eec7b5bb09
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD542dc7628d29552efa816d58b47854bda
SHA1fe1b84cf8d51ef7d1cc7a63d406d364bf91f930a
SHA2563e0e531a7e57c1ce28b41b7e2d32b166becca191834f2ccd7740e5a81a05c46f
SHA512f3e21306802232587d6851154a39a521a164d007e742c48be76a1d12b6a2eec71d0cdd9dffaf8fc09b821666b54335891523c19b30204d055d20fe34aedb4a14