Overview
overview
10Static
static
7a6e9684002...c0.exe
windows7-x64
10a6e9684002...c0.exe
windows10-2004-x64
10$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_39_/PowerRun64.exe
windows7-x64
4$_39_/PowerRun64.exe
windows10-2004-x64
3$_39_/SetACL64.exe
windows7-x64
1$_39_/SetACL64.exe
windows10-2004-x64
1$_39_/bn.bat
windows7-x64
1$_39_/bn.bat
windows10-2004-x64
1$_39_/bn1.bat
windows7-x64
10$_39_/bn1.bat
windows10-2004-x64
10$_39_/bnn.bat
windows7-x64
1$_39_/bnn.bat
windows10-2004-x64
1$_39_/bnz.bat
windows7-x64
1$_39_/bnz.bat
windows10-2004-x64
1$_39_/dotN...up.exe
windows7-x64
7$_39_/dotN...up.exe
windows10-2004-x64
7$_39_/dotN...up.exe
windows7-x64
7$_39_/dotN...up.exe
windows10-2004-x64
7$_39_/tbjf...du.exe
windows7-x64
3$_39_/tbjf...du.exe
windows10-2004-x64
3$_39_/win_...rp.exe
windows7-x64
3$_39_/win_...rp.exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 02:38
Behavioral task
behavioral1
Sample
a6e96840029b64d72ddfd94ede969f521e1c05b91d5c23eee56b66afae6800c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a6e96840029b64d72ddfd94ede969f521e1c05b91d5c23eee56b66afae6800c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_39_/PowerRun64.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$_39_/PowerRun64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$_39_/SetACL64.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$_39_/SetACL64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$_39_/bn.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$_39_/bn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$_39_/bn1.bat
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
$_39_/bn1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$_39_/bnn.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$_39_/bnn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$_39_/bnz.bat
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
$_39_/bnz.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_39_/dotNetFx40_Full_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$_39_/dotNetFx40_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$_39_/dotNetFx45_Full_setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$_39_/dotNetFx45_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$_39_/tbjfarxhkycdu.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
$_39_/tbjfarxhkycdu.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$_39_/win_version_csharp.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$_39_/win_version_csharp.exe
Resource
win10v2004-20241007-en
General
-
Target
$_39_/PowerRun64.exe
-
Size
923KB
-
MD5
efe5769e37ba37cf4607cb9918639932
-
SHA1
f24ca204af2237a714e8b41d54043da7bbe5393b
-
SHA256
5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2
-
SHA512
33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1
-
SSDEEP
24576:X2DW/xbMX2YIbxQsu3/PNLoQ+HyS2I4jRk:X2EgXoQsW/PNUQWnX4jRk
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CbsPersist_20241108023858.cab makecab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3044 PowerRun64.exe 2640 PowerRun64.exe 2640 PowerRun64.exe 2808 PowerRun64.exe 2808 PowerRun64.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3044 PowerRun64.exe 2664 PowerRun64.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2640 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2640 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2640 PowerRun64.exe Token: 0 2640 PowerRun64.exe Token: SeDebugPrivilege 2808 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2808 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2808 PowerRun64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2640 3044 PowerRun64.exe 30 PID 3044 wrote to memory of 2640 3044 PowerRun64.exe 30 PID 3044 wrote to memory of 2640 3044 PowerRun64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe" /P:3935042⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe" /P:3935043⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_39_\PowerRun64.exe" /TI/ /P:3935044⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2664
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20241108023858.log C:\Windows\Logs\CBS\CbsPersist_20241108023858.cab1⤵
- Drops file in Windows directory
PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50663e42eec973f30fa9317a7406b3556
SHA1bd8f1e0ecd714df4d7542d40e81e10fbca71341e
SHA25691e3b734bca96d29c1768b0a476c4b009410c6f7d6d5a20cefd2c596e3ab7030
SHA512474ce2c8d16810c18881b177a36d72df218b2a00c744a8c39b4f591460d850a3e6be75d76c9ac3de3e74e893d38a15f6c8da44081d6f2c509f07e723d8000418
-
Filesize
81KB
MD5940b1915cadee0e2b33d80799816f6c7
SHA12c10e4fec3e8c054055d1ed78757117575f273f2
SHA25681e89e7266cfe5158e44f5578c8be61353e781daebdd47a33597e9ec503d379c
SHA512cc3c574fd5392c1b54146b591e22b1c01c95e34a602c403ad96c49b7ee6ad31d1478a00cc1334286addc5cb94496372a172745e9ad20554023e1e22c7da1e1c5
-
Filesize
25KB
MD5436c1bb98deeccecb73fad945f1dd3dc
SHA1774313ba911945589971bbc73498d81f060dabe6
SHA25605eae1691149cc66e458d5e5b4430bd3b938b278b8bdb2c887a13c9871004c51
SHA51266ea41b9b4a42f7c40d1ce5b6e82a6f03e8489648b912d96a81efa13d340d4d651078df7c1302c595ca83408e7208d1d79f02165dc27383952a9abe7f851c3e2