Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-10-2024 01:56

General

  • Target

    89360a01c95a9aee2ea2af6fe15693baefabe2d31beb3c43fcbc390d73c3bee5.exe

  • Size

    989KB

  • MD5

    2412cbbed6081fd40494028b7ff5e791

  • SHA1

    0f404ae35ee0193e07a6cc26391f7560ec103ab9

  • SHA256

    89360a01c95a9aee2ea2af6fe15693baefabe2d31beb3c43fcbc390d73c3bee5

  • SHA512

    03ea2096fa8c34f668c301549d6dd7152e24e8d50b9cf5fca63452eecf720bac0e084ddc56a28cf558b2da32c3e5cb7cc036e06eb9735c4a443a7ffe75aeb055

  • SSDEEP

    24576:K+63kmIlyh9fgMAC7Nr8xAGuwIm/yWiopvC9wi:K+TOflm/RaWi6Mwi

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89360a01c95a9aee2ea2af6fe15693baefabe2d31beb3c43fcbc390d73c3bee5.exe
    "C:\Users\Admin\AppData\Local\Temp\89360a01c95a9aee2ea2af6fe15693baefabe2d31beb3c43fcbc390d73c3bee5.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "$Parthenocissus=Get-Content -raw 'C:\Users\Admin\AppData\Local\fona\Kvit\Snurre.Cha';$Bekendelsesskriftets=$Parthenocissus.SubString(2518,3);.$Bekendelsesskriftets($Parthenocissus)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2124
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "$Parthenocissus=Get-Content -raw 'C:\Users\Admin\AppData\Local\fona\Kvit\Snurre.Cha';$Bekendelsesskriftets=$Parthenocissus.SubString(2518,3);.$Bekendelsesskriftets($Parthenocissus)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\depoh.lnk

    Filesize

    878B

    MD5

    380481a97e3aa49e2940d0bbb6989501

    SHA1

    6da0cec7122699330f174ea0c52f53c5a0057042

    SHA256

    d77bf6385c7bb1a8018625a08ed752994b65183d6fd6d111aa33a631f917faca

    SHA512

    6d900666370fad9fba38272e7f9a5449f46be81f70df23ecfc7a42cf27d8821e913a7fc64e9a972ee701e122b3059c9fb0f5be4be4cbbf0c3294b38376508168

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\depoh.lnk

    Filesize

    852B

    MD5

    665e5740cf991650e61944fe0f828373

    SHA1

    90a1c975e50761d44c0931edc6fcbe2560513c97

    SHA256

    81d8a71ea8608fff35306875ab221ad3c99cd33e2fb84ede7ab2d7a5b1d0d53f

    SHA512

    c7fefee9cceb152e3dece33ebb64bf3282a7e24edc85b1f85f830677da335e336306dd5f2214248afd677974852c8581778c427fdd2c2f49c43d890ed1178d9e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    c226eac46176f226a8a267ccd2ace00c

    SHA1

    a215b3cded081f2b6b4ed38de3064ea1e5f39b66

    SHA256

    a07e29eb525c453362881b6ae080abc03e3f210f0ec3a379680adc5ba85dee1c

    SHA512

    7e5ab1ec2b4401e46d52d7ef2739f50669e5d34606a20916ef06f47c1996a294ac9f5781bdaf082a375db1c788eed0b158575c7bc2c730b38c082ed5d11ba20e

  • memory/2124-182-0x0000000073F41000-0x0000000073F42000-memory.dmp

    Filesize

    4KB

  • memory/2124-183-0x0000000073F40000-0x00000000744EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2124-184-0x0000000073F40000-0x00000000744EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2124-186-0x0000000073F40000-0x00000000744EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2124-185-0x0000000073F40000-0x00000000744EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2124-187-0x0000000073F40000-0x00000000744EB000-memory.dmp

    Filesize

    5.7MB