Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
data.exe
Resource
win7-20240903-en
General
-
Target
data.exe
-
Size
81.2MB
-
MD5
7a71caee51f0980b56420e3a49d2778e
-
SHA1
4827b90daf016b1bb2a07edcc65bad5639d2df69
-
SHA256
7058adbf8289fc200e94acbca32c23cb0dce33bd3bd29c10e0a900a109828342
-
SHA512
9bc6f0fc1d5f3ec1d9fd29723b8fed72671b82fa20387b345d4d14b6c1032aca2fb7353730764c2ac5fe7b3e6dfcf4ebc0e9dbc4c9ed98c1a869b60ed3d41ed3
-
SSDEEP
1572864:Db2bBvAXX++3yEbvFtg8qsRfbMi63N4XZX6jSHREle440fzKM4qt:DUAX7xTkEdO3NkkCREk44qKS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2468 data.tmp -
Loads dropped DLL 2 IoCs
pid Process 1404 data.exe 2468 data.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Trello\assets\is-H9NKN.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-IE15K.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-DT90J.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-Q708B.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-512SA.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-23T6O.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-AOL7U.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-0P99E.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-S69SN.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-257TR.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-NGV0P.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-QTNDF.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-JJHLE.tmp data.tmp File created C:\Program Files (x86)\Trello\is-G4P6Q.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-GPBSV.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-BLM80.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-CBSFI.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-P7IFQ.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-97HFE.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-KMNVO.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-M71AM.tmp data.tmp File created C:\Program Files (x86)\Trello\unins000.dat data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-TTG7V.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-UFAGD.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-NBBI4.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-J8Q8Q.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-M7LNM.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-3FO52.tmp data.tmp File created C:\Program Files (x86)\Trello\is-5R4CJ.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-LI235.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-LMG0Q.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-5J44V.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-IHACV.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-N8R29.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-SPCHP.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-HTB3V.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-T4NS3.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-3TMOG.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-J8AUS.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-N2TJ6.tmp data.tmp File created C:\Program Files (x86)\Trello\AppxMetadata\is-MVFQA.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-4LCIQ.tmp data.tmp File created C:\Program Files (x86)\Trello\is-QARG8.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-8I48S.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-Q254D.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-3AM5K.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-6E830.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-DITK7.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-7AG0N.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-T5F8L.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-LPR74.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-QEIAL.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-A2K1P.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-GCNJQ.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-UE9H8.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-V8LHM.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-QU69U.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-S1SSJ.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-ANN1A.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-SULEU.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-17E1D.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-CCH17.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-CRQML.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-1OV25.tmp data.tmp -
pid Process 2484 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language data.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2484 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 data.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2468 1404 data.exe 31 PID 1404 wrote to memory of 2468 1404 data.exe 31 PID 1404 wrote to memory of 2468 1404 data.exe 31 PID 1404 wrote to memory of 2468 1404 data.exe 31 PID 1404 wrote to memory of 2468 1404 data.exe 31 PID 1404 wrote to memory of 2468 1404 data.exe 31 PID 1404 wrote to memory of 2468 1404 data.exe 31 PID 2468 wrote to memory of 2484 2468 data.tmp 32 PID 2468 wrote to memory of 2484 2468 data.tmp 32 PID 2468 wrote to memory of 2484 2468 data.tmp 32 PID 2468 wrote to memory of 2484 2468 data.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\data.exe"C:\Users\Admin\AppData\Local\Temp\data.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\is-LS967.tmp\data.tmp"C:\Users\Admin\AppData\Local\Temp\is-LS967.tmp\data.tmp" /SL5="$30144,79536227,793600,C:\Users\Admin\AppData\Local\Temp\data.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\is-67LQ3.tmp\ExtractedContent.ps1"3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5241f46df70e4c5976a15dac5c4bed2c5
SHA1cff78f9ca161bdcaa023cc9fc1cf038e384423f1
SHA256922e9a96539e10c28be59241ffc85655a8d3f9dca2a62685b60b06fa5c08a793
SHA51282ea124d0e50eaace27918b43113066d864131b9c7c50ab7640ce91eaadca24229e1c65ff1ca1a0d9ba9812d6d5216b9107179bdbeabb661aebed5335c4065a1
-
Filesize
4KB
MD513798630fab3b4067136cab018f15e4f
SHA1461129b4231e812a9b88d3a94c769c9533cccb2e
SHA2564e7fa35ece0d853941f239d3f81a469ca748bc5f89fea6e8c9a2ad236da2bf8c
SHA5124ba81f23c4fc1f518e00ded08102c2f91286c829dc9d5204a7eec11e6db96fb66d2ca807436268b6b8ecfa1627a466c8f98e46053a62798e247d19facba6cf47
-
Filesize
5.5MB
MD5f7e2624867775590018ce9586ac1d4a8
SHA16e2e80d1bde207734647b48d71dc483ff56a29a1
SHA2560547b50b9070c88c19d054d1d2f084f72fe3717be07265af0ea4ce87ffd8ebc5
SHA512fa8312dbac3b24f3d8d09576084f04e7289f2878bd5b4157328fc51259ca918a8874fa1e60b0f095634abe2f86a64941c74f702ffb52ed80c0310d8622297c2e
-
Filesize
3.1MB
MD596e4284d93ad6b7a7e984a2589114947
SHA1a136065002fcbe8cf19c717067c221b3952d8413
SHA2567e0f0655849839a1f48533e00fb78f60f28a43c73119b5bb01c20cc1c8d796b9
SHA512a4ed28826daf48987316bbde6187a7fb2d181f4c64c84bd6eb66ebee72f7b5a726bc7e1627e4332a7a1ef3325f9257eccaaa4331989e5693a2dc659e2eaec0f6