Resubmissions

02-12-2024 01:29

241202-bwgrxsslev 6

01-12-2024 01:16

241201-bm536a1rbv 7

01-12-2024 01:06

241201-bf6q4swlcn 6

30-11-2024 23:55

241130-3yyxrstqbq 6

30-11-2024 23:55

241130-3ypn4azjfv 6

30-11-2024 23:35

241130-3lf67atmal 6

30-11-2024 22:13

241130-15bppsxjhx 7

27-11-2024 20:24

241127-y6snhaynhv 7

26-11-2024 17:03

241126-vkvzyswqdk 7

Analysis

  • max time kernel
    254s
  • max time network
    212s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 23:35

General

  • Target

    psr.exe

  • Size

    13.4MB

  • MD5

    33c9518c086d0cca4a636bc86728485e

  • SHA1

    2420ad25e243ab8905b49f60fe7fb96590661f50

  • SHA256

    ba30ea16cd8fbd9209d40ae193206ad00f042d100524cf310982c33369325ca2

  • SHA512

    6c2c470607b88e7cd79411b7a645b395cee3306a23e6ba50b8ac57f7d5529a1b350c34e19da69aeb1ffade44d5187b4a1ef209a53d21a83e9e35add10fc7867d

  • SSDEEP

    49152:W/XzWTJmbjeHLKLpyNpaQ+69tPvGUmskDXs4Awd9CBqcUiInvlT2hPnXiwzYJ33S:W/EmGrKL2pllzP+UNkEARmzY1C

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\psr.exe
    "C:\Users\Admin\AppData\Local\Temp\psr.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2844
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2996
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2020
    • C:\Users\Admin\AppData\Local\Temp\psr.exe
      "C:\Users\Admin\AppData\Local\Temp\psr.exe"
      1⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:920
    • C:\Users\Admin\AppData\Local\Temp\psr.exe
      "C:\Users\Admin\AppData\Local\Temp\psr.exe"
      1⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_372.wmdb

      Filesize

      1.0MB

      MD5

      03c4d2526cd04308667731279ec02bba

      SHA1

      3ad6278a913994ec1406f6fb323e464d94055d4e

      SHA256

      c75db2912c3f774b2d123ab848cfee7dba8a4e47ec2f40ce9b2ca38dfe16277d

      SHA512

      02d76fb818f761dc0924f046f1b2086f978a1e156abddc5afaaa4452df0841d78f8d02e77f26bec3763369e770f9da5625be1c4c3876dc57285bc792b06bedd0

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_372.wmdb

      Filesize

      1.0MB

      MD5

      c2e4ed743b924bc47759727eacdf33bb

      SHA1

      0a72b801344cf552ea2d82e76d44ca6e9e84e1a1

      SHA256

      a0bdb0a8379880066a4b6ef8e0a45d3966664df5fec4b4133a9b5f4f910e025f

      SHA512

      85cd2047c30ab6ba215fc584867e9a0bc93b622e5832d53ba104c8ad6fedc8a74b38134a10b72a4521448b17290c7db81ec6978a3da6d610f5d3d727c8f81480

    • C:\Users\Admin\AppData\Local\Temp\LogoAnimation.gif

      Filesize

      327KB

      MD5

      93bd7bf04d77912d98aaed6decad1b8e

      SHA1

      885cd97fe084cc15c339aa9131dbaa98bdec38fe

      SHA256

      a90c6244e2202b30a83db9eff60c06ba73c27307c357358f76679477782453c5

      SHA512

      6d5c070459af13f9564514f975b0ed623518a9277d4bf359be8035dd3e15e81356017baa944042af9b8c61c78b659192aff624a262f41cffe2c282b67afe2eb4

    • memory/920-43-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-44-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-32-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-35-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-33-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-40-0x00000000004E0000-0x00000000004EA000-memory.dmp

      Filesize

      40KB

    • memory/920-41-0x00000000004E0000-0x00000000004EA000-memory.dmp

      Filesize

      40KB

    • memory/920-42-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-31-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-25-0x00000000004E0000-0x00000000004EA000-memory.dmp

      Filesize

      40KB

    • memory/920-36-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-26-0x00000000004E0000-0x00000000004EA000-memory.dmp

      Filesize

      40KB

    • memory/920-34-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-47-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-46-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-45-0x0000000002E00000-0x0000000002E0A000-memory.dmp

      Filesize

      40KB

    • memory/920-24-0x0000000000940000-0x00000000016AA000-memory.dmp

      Filesize

      13.4MB

    • memory/2296-48-0x00000000002A0000-0x000000000100A000-memory.dmp

      Filesize

      13.4MB

    • memory/2296-49-0x0000000001250000-0x000000000125A000-memory.dmp

      Filesize

      40KB

    • memory/2296-54-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

      Filesize

      40KB

    • memory/2296-55-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

      Filesize

      40KB

    • memory/2296-57-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

      Filesize

      40KB

    • memory/2296-56-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

      Filesize

      40KB

    • memory/2296-61-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

      Filesize

      40KB

    • memory/2296-62-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

      Filesize

      40KB

    • memory/2844-19-0x00000000743F0000-0x0000000074ADE000-memory.dmp

      Filesize

      6.9MB

    • memory/2844-15-0x00000000743FE000-0x00000000743FF000-memory.dmp

      Filesize

      4KB

    • memory/2844-6-0x00000000743F0000-0x0000000074ADE000-memory.dmp

      Filesize

      6.9MB

    • memory/2844-12-0x0000000000A90000-0x0000000000A9A000-memory.dmp

      Filesize

      40KB

    • memory/2844-18-0x00000000003F0000-0x00000000003FA000-memory.dmp

      Filesize

      40KB

    • memory/2844-0-0x00000000743FE000-0x00000000743FF000-memory.dmp

      Filesize

      4KB

    • memory/2844-4-0x00000000003F0000-0x00000000003FA000-memory.dmp

      Filesize

      40KB

    • memory/2844-11-0x0000000000A90000-0x0000000000A9A000-memory.dmp

      Filesize

      40KB

    • memory/2844-1-0x00000000010C0000-0x0000000001E2A000-memory.dmp

      Filesize

      13.4MB

    • memory/2844-10-0x0000000000A90000-0x0000000000A9A000-memory.dmp

      Filesize

      40KB

    • memory/2844-3-0x00000000003F0000-0x00000000003FA000-memory.dmp

      Filesize

      40KB

    • memory/2844-17-0x00000000003F0000-0x00000000003FA000-memory.dmp

      Filesize

      40KB

    • memory/2844-16-0x00000000743F0000-0x0000000074ADE000-memory.dmp

      Filesize

      6.9MB

    • memory/2844-2-0x00000000743F0000-0x0000000074ADE000-memory.dmp

      Filesize

      6.9MB

    • memory/2844-9-0x0000000000A90000-0x0000000000A9A000-memory.dmp

      Filesize

      40KB

    • memory/2996-21-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2996-22-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2996-23-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2996-20-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB