Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 03:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Documenti di spedizione.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Documenti di spedizione.exe
-
Size
617KB
-
MD5
79cb40033e328f61fe68bd76dd67a7b3
-
SHA1
a68854ec2481fc2f874e2180dabb155e65c6fbd4
-
SHA256
255ddfdf1409d89110925cfa93ba323d1a68b6c0916764169eeea521867816a6
-
SHA512
7ef13f9f7e75c865a7c8140b9c615687e04cc1e46076de75a963952dff2d000576481854dce0e98cde8db9ee9c12f43cd8def9634fc7b00b09a0b95b6ca6e3cb
-
SSDEEP
12288:MDG0VKZA6BbbHyqrSXA8xvJMUzPvRQIBD7f/KYC+c8cIti62JB8PoZSBm:QKeybHyYSh1CefD7nxFTcIM62H87Bm
Malware Config
Signatures
-
pid Process 2788 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Documenti di spedizione.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2788 2660 Documenti di spedizione.exe 31 PID 2660 wrote to memory of 2788 2660 Documenti di spedizione.exe 31 PID 2660 wrote to memory of 2788 2660 Documenti di spedizione.exe 31 PID 2660 wrote to memory of 2788 2660 Documenti di spedizione.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documenti di spedizione.exe"C:\Users\Admin\AppData\Local\Temp\Documenti di spedizione.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Grnsehandelens=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\stuehuset\Miljfarlig\gerodontology\Uveitic\Delagtig.Sny';$twyver=$Grnsehandelens.SubString(2792,3);.$twyver($Grnsehandelens)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-