Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 03:42

General

  • Target

    d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe

  • Size

    632KB

  • MD5

    95359158d57fb8ceb0093d85bdec58b4

  • SHA1

    50c7d83505c11307084313f5a6badb7dbf619b75

  • SHA256

    d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580

  • SHA512

    ab76232fb8252ed72f12c6ddef03b4cdfa729d89e9eb735e32d6a5bd9d202ab5b1690a0fdb28a36d345238ce3231b2789e75ae5a6e2d25af13cdbc6876a45cba

  • SSDEEP

    12288:ONBi378EzqgDY62EJNSGI4GoI2iJK06rNkRDjGQB7F0PgvD5Fb7q:ONg37HqO/hsGjIP4HNktGQMPgNpq

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe
    "C:\Users\Admin\AppData\Local\Temp\d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Paasknnelsers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Analytiske.Ant';$Besnrelsers=$Paasknnelsers.SubString(54211,3);.$Besnrelsers($Paasknnelsers)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2424
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Paasknnelsers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Analytiske.Ant';$Besnrelsers=$Paasknnelsers.SubString(54211,3);.$Besnrelsers($Paasknnelsers)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H32LLIIIDDWP6ZO11Q69.temp

    Filesize

    7KB

    MD5

    25dcbe35574d43ef0247e4b1af2c201f

    SHA1

    c029bf3cc067ee5acb09835c464d2ffc9d0dbfcb

    SHA256

    ea42f06959b05bda45ed4742e3af76e7e00670a9ab90240e5d2fb0fd6c055487

    SHA512

    895015fbb82ac75000e96326f7984a779de542a85606f107bbfabd04a3da7de85095010b5f3b9b9f6570d624b649b6e31f7bda318e3b4973538ccfcb6ff9071e