Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 17:06
Static task
static1
Behavioral task
behavioral1
Sample
Document53374pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Document53374pdf.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
Bestikkelsesanklager.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Bestikkelsesanklager.ps1
Resource
win10v2004-20241007-en
General
-
Target
Document53374pdf.exe
-
Size
916KB
-
MD5
9086c60c9ad908adaf0656122f0670fe
-
SHA1
b21a437c8319d751df3d62302c5182162f1999d1
-
SHA256
c2a0d55f2c24ea39b05e847cd7e0c1a08289af1d24545e689bd88add8a26b599
-
SHA512
f4144165f652508a6730fc52a9b7fe71158a57c76b92b9d25dbf2d7998f68dda33b6200c637ac018e8ceacd22a25729053a4ea73e030b7ebc1ce56d709956af2
-
SSDEEP
24576:oe56hiS2BhRz6eKlZjZZz7AZ0Ig/X96PIwHHXgrFJcgps:Z6sSG7KjZ9AZ0rUP1H32FJ7s
Malware Config
Signatures
-
pid Process 1804 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Document53374pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1804 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1804 2312 Document53374pdf.exe 31 PID 2312 wrote to memory of 1804 2312 Document53374pdf.exe 31 PID 2312 wrote to memory of 1804 2312 Document53374pdf.exe 31 PID 2312 wrote to memory of 1804 2312 Document53374pdf.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document53374pdf.exe"C:\Users\Admin\AppData\Local\Temp\Document53374pdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle 1 "$Biometrician=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\Rann242\Panphobia\Bestikkelsesanklager.Qui';$Adelsbreves162=$Biometrician.SubString(53180,3);.$Adelsbreves162($Biometrician)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-