Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 18:27

General

  • Target

    8b1fcad83099e1daf3accdb39f68a0bd696b053aadc8472e9008fd027a390404.exe

  • Size

    769KB

  • MD5

    936079e96cd90d0029f53f772370a11d

  • SHA1

    daeb253c32cdc076b4e42b8e51eda74ee9865639

  • SHA256

    e25e7e373276c2ee56849be99f4a14a420fc85ad8d35ee13c2a3574524090af3

  • SHA512

    4df164c42b1a09a6375438d13d04f5ee7a3fa0fc0aa43eb92dc602e1597fb28a31a3a62d99cce4d252fb2e88aa98cd29413073f1613630d8d86870d95f027361

  • SSDEEP

    24576:SMwhYwlRZjfxAyExC8Zx0PARxFWfcFqal/F4X5ZiN:SMwhNlR5xAFZq+WfQiX5u

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b1fcad83099e1daf3accdb39f68a0bd696b053aadc8472e9008fd027a390404.exe
    "C:\Users\Admin\AppData\Local\Temp\8b1fcad83099e1daf3accdb39f68a0bd696b053aadc8472e9008fd027a390404.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "$Linenette=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\haandbog\Tanagridae.Und';$Istandsat=$Linenette.SubString(56161,3);.$Istandsat($Linenette)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\orts.lnk

    Filesize

    1KB

    MD5

    b2f88d787cefca8ebc74c929a77c26d3

    SHA1

    c35cdb7e2b06392c9420a1e1cfd51e82453443f8

    SHA256

    414fd42a7e74a300228a04b0cc67d00dbedcd048ba5bfe1ed08cabf6bb2c98c3

    SHA512

    68220a86bf52a7eac09bfa3af65f6800e0868ed19c15c90ec90bab627f32257d580e247c56e337fc58752f3047d46dc00e1396b9650bfa8373b93961aab0f9af

  • memory/2344-144-0x0000000074331000-0x0000000074332000-memory.dmp

    Filesize

    4KB

  • memory/2344-146-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2344-145-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2344-147-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2344-148-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2344-149-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB