Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
Overheaped237.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Overheaped237.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
Overheaped237.exe
-
Size
573KB
-
MD5
8f4adfd3b8c55670a99389ba3905e43d
-
SHA1
24e4a66a55b65fe58933ac92b161befc5c5df977
-
SHA256
8126f3d67e43f2c93f178b68cc6a791a61c7f4f986cd5fb0d213780c4aa8e2d4
-
SHA512
9ddc6fb7d8f92d4ad22e1842704dfd8cad0184f86c9482fb2cbc051008a46bb87449c8abba66b4179fc602978c31ea9215cd070c7008e39f71b6d24a43c3c527
-
SSDEEP
12288:d93jliesAP5dtwQYYy016wq2FFbyADqbM5LugDkzicmrdZNf:d93jliR4jasy01DHn+AWYROicudZNf
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2560 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 Overheaped237.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\udlndingelovene\troldunge.ini Overheaped237.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Overheaped237.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2560 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2560 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2560 2112 Overheaped237.exe 31 PID 2112 wrote to memory of 2560 2112 Overheaped237.exe 31 PID 2112 wrote to memory of 2560 2112 Overheaped237.exe 31 PID 2112 wrote to memory of 2560 2112 Overheaped237.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Overheaped237.exe"C:\Users\Admin\AppData\Local\Temp\Overheaped237.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Circumcorneal=gc -raw 'C:\Users\Admin\AppData\Roaming\china\Mixeren\verbalises\Deinos253\Ekstensives.Bnd';$Liturgiernes=$Circumcorneal.SubString(18059,3);.$Liturgiernes($Circumcorneal) "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764B
MD5113c7f68bd306e93df73d81b3fdded07
SHA11189dbe04e1c73ac5498596d63112047d1616bbe
SHA256bdfaa71cdb1c7d4bcf3ee8a486f89af20f864b07230bd881331d536ae7657036
SHA512257ddd740cdbe700041dcbd4e27d88b692333d354e226cc608b69108ed66c6bfcbc9bd445e81c0672808a1cff318ba5030fca6b39046cc709a5182c3c2cbb79f
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2