Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/02/2025, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
3cdf02f1e4f157615d752fb63eb1d073.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3cdf02f1e4f157615d752fb63eb1d073.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
Respektlsestes.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Respektlsestes.ps1
Resource
win10v2004-20250207-en
General
-
Target
3cdf02f1e4f157615d752fb63eb1d073.exe
-
Size
767KB
-
MD5
3cdf02f1e4f157615d752fb63eb1d073
-
SHA1
66c1220e48da186f6f94f0107ec8449878c3b873
-
SHA256
dab79a6a1178db25ff7368d7d053171539f737c246a02549be64cd7f2f36dffb
-
SHA512
a800fb8c50116397af66f4181ff8fbde8e04ccff103c34b860c92801ac68e2e26bf9be1866dae6554787c6b97310b8969741a78f9ee5ec9d74ed71b28817a8ed
-
SSDEEP
12288:SGYEBUTGfcYjgCqOBHh02/24NCR9fQ9lyAjaGV+68L4jQ03eo8EeV+68L1lfHphf:zYi6GTj5TJN6Y9l9WDiQSesL1lfJhf
Malware Config
Signatures
-
pid Process 1652 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cdf02f1e4f157615d752fb63eb1d073.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1652 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 564 wrote to memory of 1652 564 3cdf02f1e4f157615d752fb63eb1d073.exe 30 PID 564 wrote to memory of 1652 564 3cdf02f1e4f157615d752fb63eb1d073.exe 30 PID 564 wrote to memory of 1652 564 3cdf02f1e4f157615d752fb63eb1d073.exe 30 PID 564 wrote to memory of 1652 564 3cdf02f1e4f157615d752fb63eb1d073.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cdf02f1e4f157615d752fb63eb1d073.exe"C:\Users\Admin\AppData\Local\Temp\3cdf02f1e4f157615d752fb63eb1d073.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle 1 "$Tandhvalernes101=GC -raw 'C:\Users\Admin\AppData\Local\Temp\stor\bundsnrers\immonastered\Respektlsestes.Ves';$diskussionslister=$Tandhvalernes101.SubString(52950,3);.$diskussionslister($Tandhvalernes101)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-