Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2024, 02:13

General

  • Target

    8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe

  • Size

    661KB

  • MD5

    8a9c90ba02c22e957bff42c02e6a4189

  • SHA1

    4fe3080dbf75f99fa64dbf4e35f08560d4b2ef0c

  • SHA256

    8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628

  • SHA512

    de296476d773f0d61feb647376ee9f2131463bafb18243adcfd8ccd2e6b958ebf90294d24e09a1ef526ff8b25d8d6d291217766514d6cdd9f60afc8ed417bb50

  • SSDEEP

    12288:vc5+AfopdAeHHn7XpjIW0ep9Rr2M/iTGYqWofv1zSFXMhuV+7+bY:vZAaAeHHlECyCiuW095ugcY

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe
    "C:\Users\Admin\AppData\Local\Temp\8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Frustreringers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Mixende\Klausuleringerne\Jobation.udk';$Brndes=$Frustreringers.SubString(53183,3);.$Brndes($Frustreringers)
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2340-8-0x0000000074151000-0x0000000074152000-memory.dmp

    Filesize

    4KB

  • memory/2340-9-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2340-10-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2340-11-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2340-12-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2340-13-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB