Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
General
-
Target
file.exe
-
Size
586KB
-
MD5
66b03d1aff27d81e62b53fc108806211
-
SHA1
2557ec8b32d0b42cac9cabde199d31c5d4e40041
-
SHA256
59586e753c54629f428a6b880f6aff09f67af0ace76823af3627dda2281532e4
-
SHA512
9f8ef3dd8c482debb535b1e7c9155e4ab33a04f8c4f31ade9e70adbd5598362033785438d5d60c536a801e134e09fcd1bc80fc7aed2d167af7f531a81f12e43d
-
SSDEEP
12288:VrOj+Ri3AgFdZeDZskwkzA0+7xUNq4KC73vUECPnsSnR83PdB0:xQ3AgSskwZNeEqdCPssS3F
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
file.exepowershell.exepid process 2064 file.exe 2064 file.exe 2064 file.exe 2064 file.exe 2064 file.exe 2064 file.exe 2064 file.exe 2064 file.exe 2064 file.exe 2064 file.exe 2200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
file.exepowershell.exedescription pid process Token: SeDebugPrivilege 2064 file.exe Token: SeDebugPrivilege 2200 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
file.exedescription pid process target process PID 2064 wrote to memory of 2200 2064 file.exe powershell.exe PID 2064 wrote to memory of 2200 2064 file.exe powershell.exe PID 2064 wrote to memory of 2200 2064 file.exe powershell.exe PID 2064 wrote to memory of 2200 2064 file.exe powershell.exe PID 2064 wrote to memory of 2460 2064 file.exe file.exe PID 2064 wrote to memory of 2460 2064 file.exe file.exe PID 2064 wrote to memory of 2460 2064 file.exe file.exe PID 2064 wrote to memory of 2460 2064 file.exe file.exe PID 2064 wrote to memory of 2836 2064 file.exe file.exe PID 2064 wrote to memory of 2836 2064 file.exe file.exe PID 2064 wrote to memory of 2836 2064 file.exe file.exe PID 2064 wrote to memory of 2836 2064 file.exe file.exe PID 2064 wrote to memory of 2844 2064 file.exe file.exe PID 2064 wrote to memory of 2844 2064 file.exe file.exe PID 2064 wrote to memory of 2844 2064 file.exe file.exe PID 2064 wrote to memory of 2844 2064 file.exe file.exe PID 2064 wrote to memory of 2956 2064 file.exe file.exe PID 2064 wrote to memory of 2956 2064 file.exe file.exe PID 2064 wrote to memory of 2956 2064 file.exe file.exe PID 2064 wrote to memory of 2956 2064 file.exe file.exe PID 2064 wrote to memory of 2960 2064 file.exe file.exe PID 2064 wrote to memory of 2960 2064 file.exe file.exe PID 2064 wrote to memory of 2960 2064 file.exe file.exe PID 2064 wrote to memory of 2960 2064 file.exe file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:2960
-