Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20250217-en
General
-
Target
loader.exe
-
Size
64.4MB
-
MD5
8d2648418bae33657c018bba48986552
-
SHA1
ba8b6fd3bd2ef772e5f3a0db7f40ce73a916fc3e
-
SHA256
80d76f13907f3910ff9db3c107eff209aaf0a4d2e782e795e5a0e95ec7df09be
-
SHA512
a27ae27487660d797c1e2d24632abeb3eedfff66ee260ba6bb3313e8f660b371838e56207268961cb34f725295b485507e35ab1331963add70be2c3b7c547e70
-
SSDEEP
393216:RjaZgP8kqfoo53we9r9OJ/sbA9ZhGInxtnWxvdiQ2OUNpCEp7kN3VkQGQPNLFu48:pkghqfk49Otsbyx1DOUNoER7gq
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2640 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2640 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2636 1364 loader.exe 29 PID 1364 wrote to memory of 2636 1364 loader.exe 29 PID 1364 wrote to memory of 2636 1364 loader.exe 29 PID 2636 wrote to memory of 2640 2636 cmd.exe 31 PID 2636 wrote to memory of 2640 2636 cmd.exe 31 PID 2636 wrote to memory of 2640 2636 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath C:\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-