Analysis
-
max time kernel
25s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe
Resource
win10v2004-20241007-en
General
-
Target
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe
-
Size
815KB
-
MD5
61828c5fd9b41ff6f35e70a215f7fd70
-
SHA1
5c4e73cad4f8fe7e52c91a1584a76680c0980bf9
-
SHA256
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6
-
SHA512
ed8c2fe0538de00fd8c827d067530782a7169c72feb06959155d4dac6df42027cb12b9ec2c9dbaa1fa72ded2cff20c0c49427efb5005c55ffe5b80b235da09f5
-
SSDEEP
24576:XsTo7do5wpkCEG9vG+3rG9SOSEHKpwsu:A75CF9vGpHGws
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exepowershell.exepid Process 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 2988 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exepowershell.exedescription pid Process Token: SeDebugPrivilege 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe Token: SeDebugPrivilege 2988 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exedescription pid Process procid_target PID 1680 wrote to memory of 2988 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 31 PID 1680 wrote to memory of 2988 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 31 PID 1680 wrote to memory of 2988 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 31 PID 1680 wrote to memory of 2988 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 31 PID 1680 wrote to memory of 2756 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 33 PID 1680 wrote to memory of 2756 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 33 PID 1680 wrote to memory of 2756 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 33 PID 1680 wrote to memory of 2756 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 33 PID 1680 wrote to memory of 2980 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 34 PID 1680 wrote to memory of 2980 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 34 PID 1680 wrote to memory of 2980 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 34 PID 1680 wrote to memory of 2980 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 34 PID 1680 wrote to memory of 2872 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 35 PID 1680 wrote to memory of 2872 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 35 PID 1680 wrote to memory of 2872 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 35 PID 1680 wrote to memory of 2872 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 35 PID 1680 wrote to memory of 2612 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 36 PID 1680 wrote to memory of 2612 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 36 PID 1680 wrote to memory of 2612 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 36 PID 1680 wrote to memory of 2612 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 36 PID 1680 wrote to memory of 2908 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 37 PID 1680 wrote to memory of 2908 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 37 PID 1680 wrote to memory of 2908 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 37 PID 1680 wrote to memory of 2908 1680 5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"2⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"2⤵PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"2⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"2⤵PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"C:\Users\Admin\AppData\Local\Temp\5003cd2b693e2b6e2b0e126a17308b4f5ef60fc86de9ce1a90c4152c08220ee6N.exe"2⤵PID:2908
-