Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
MRP00108 & SDA00687.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MRP00108 & SDA00687.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
MRP00108 & SDA00687.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
MRP00108 & SDA00687.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Filterintegration.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Filterintegration.ps1
Resource
win10v2004-20241007-en
General
-
Target
MRP00108 & SDA00687.exe
-
Size
710KB
-
MD5
9fc11ee03f60a10e4a2f26edbf8fcdaf
-
SHA1
7ed74a2e69bd49aadc4716a420dcacea97e220d7
-
SHA256
30d74b831f98532075daed442b93067c7ce8846d7cbd557f43a13922840b698a
-
SHA512
ee2d8b55b9b2b2d3e5cf867688236299a5585be3a7516dc8027e9965b2ac7354f1bf84fcf9f998af7ed185f8b36bbfd1b1a0e6d5a41b65a6d4ed06f722382adf
-
SSDEEP
12288:X6qSGX12mgYtQvCOgMAwhsuiB/IhyrWQIUbMZHBeGoOO+XKCR6i0EYuCn0a:HJX1YBvCHMquiBJaQ/eBeGoOOKKCR655
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\dommedagsbasuner\planes.pap MRP00108 & SDA00687.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\oneupmanship.pri MRP00108 & SDA00687.exe -
pid Process 2544 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MRP00108 & SDA00687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2544 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2544 2092 MRP00108 & SDA00687.exe 30 PID 2092 wrote to memory of 2544 2092 MRP00108 & SDA00687.exe 30 PID 2092 wrote to memory of 2544 2092 MRP00108 & SDA00687.exe 30 PID 2092 wrote to memory of 2544 2092 MRP00108 & SDA00687.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\MRP00108 & SDA00687.exe"C:\Users\Admin\AppData\Local\Temp\MRP00108 & SDA00687.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Uforenelige=gc -Raw 'C:\Users\Admin\AppData\Local\Country216\Filterintegration.Eks';$indefencibly=$Uforenelige.SubString(2896,3);.$indefencibly($Uforenelige)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-