Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2025 18:00

General

  • Target

    Hellion.exe

  • Size

    38.7MB

  • MD5

    249ad37eccaba9e015040b22489d9beb

  • SHA1

    42d8416fff861d7b742ee6647c5e1133a5d24b9c

  • SHA256

    4a71cf14a9138192330a03fb9e181701c680156d4f7bf05eff833c9c95c8680b

  • SHA512

    a81cdfa4a8c38d7734daa660c4104aab141815a86d56ae4fa5c92ad805fdd5710e137c1d163557049d420fe79de3c40ad682981f89796422226beb4c4b16367b

  • SSDEEP

    786432:+mU+l7YzYSR3BA15AKiARyKVVMkMZhoDw3sAYlfSKSq0GxC:+mJwR3Bg2KtRyKvfMZaxAYlfOGxC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hellion.exe
    "C:\Users\Admin\AppData\Local\Temp\Hellion.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\AppData\Local\Temp\onefile_1796_133842888836092000\Stub.exe
      C:\Users\Admin\AppData\Local\Temp\Hellion.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2504
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_1796_133842888836092000\python310.dll

    Filesize

    4.3MB

    MD5

    e4533934b37e688106beac6c5919281e

    SHA1

    ada39f10ef0bbdcf05822f4260e43d53367b0017

    SHA256

    2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

    SHA512

    fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9

  • memory/1796-73-0x000000013F840000-0x0000000141F1A000-memory.dmp

    Filesize

    38.9MB

  • memory/2504-39-0x000000013FBF0000-0x0000000145602000-memory.dmp

    Filesize

    90.1MB

  • memory/2872-74-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2872-75-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2872-76-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB