Analysis

  • max time kernel
    150s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:11

General

  • Target

    647ab91c9355e42a7d39ffda3cedfa52.exe

  • Size

    49KB

  • MD5

    647ab91c9355e42a7d39ffda3cedfa52

  • SHA1

    ec60b03c8aa7adcb87ea27dc41e1e919cdbc8f86

  • SHA256

    a7239f12650ce4e8cff961805c83b26c66385ada6060016ec5b5355c103a4153

  • SHA512

    680f0fb91ff4ef63a4381c6c0c1abc3d3996753ed9ff59c8754aac941ae3a8648e7129781bb98168ef208360c66660d7589d5756542e8f6773ef9e62f44028e1

  • SSDEEP

    768:FCnWZWFTwL7wuikj4ey3aIKKbpxhgiEDXbOfC18kE1Gb3k:FOpwLV9ITpxETbOqE1Gb3k

Malware Config

Signatures

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 9 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Xen via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Modifies Security services 2 TTPs 1 IoCs

    Modifies the startup behavior of a security service.

  • Drops file in Windows directory 1 IoCs
  • Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs

    Command interpreters often include specific commands/flags that ignore errors and other hangups.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 1 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Disables Windows logging functionality 2 TTPs

    Changes registry settings to disable Windows Event logging.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\647ab91c9355e42a7d39ffda3cedfa52.exe
    "C:\Users\Admin\AppData\Local\Temp\647ab91c9355e42a7d39ffda3cedfa52.exe"
    1⤵
    • Modifies Windows Defender DisableAntiSpyware settings
    • Modifies Windows Defender Real-time Protection settings
    • Modifies Windows Defender notification settings
    • Modifies firewall policy service
    • Modifies security service
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Identifies Xen via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Drops startup file
    • Checks whether UAC is enabled
    • Modifies Security services
    • Drops file in Windows directory
    • Event Triggered Execution: Netsh Helper DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1708
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\647ab91c9355e42a7d39ffda3cedfa52.exe' -Force -ErrorAction SilentlyContinue"
      2⤵
      • Hide Artifacts: Ignore Process Interrupts
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4428
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\647ab91c9355e42a7d39ffda3cedfa52.exe' -Force -ErrorAction SilentlyContinue"
      2⤵
      • Deletes itself
      • Hide Artifacts: Ignore Process Interrupts
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    6cf293cb4d80be23433eecf74ddb5503

    SHA1

    24fe4752df102c2ef492954d6b046cb5512ad408

    SHA256

    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

    SHA512

    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    89f65929817198660a3e84b56b8219b8

    SHA1

    63e21b7608c89d14a3e4fc1a6f54f1585a76f284

    SHA256

    14c9734dd78d9cc64dfeb05e5fd6ff4416362e99e0ca4e223163ff54445d1881

    SHA512

    fb6bc19b61468cb8d6de0023fa8e1ad964591f357e59c5931fa8f8c6066c0a9d373c0bbeca49d950b4cf4cd7eb7e6bf8b0b29c37f86daaad8d4e619f655a0783

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2pt15shl.z4b.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1708-0-0x00007FFC86933000-0x00007FFC86935000-memory.dmp

    Filesize

    8KB

  • memory/1708-1-0x00000000003F0000-0x0000000000402000-memory.dmp

    Filesize

    72KB

  • memory/1708-11-0x0000000002650000-0x0000000002672000-memory.dmp

    Filesize

    136KB

  • memory/1708-12-0x00007FFC86930000-0x00007FFC873F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1708-31-0x00007FFC86930000-0x00007FFC873F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4428-13-0x00007FFC86930000-0x00007FFC873F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4428-14-0x00007FFC86930000-0x00007FFC873F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4428-15-0x00007FFC86930000-0x00007FFC873F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4428-29-0x00007FFC86930000-0x00007FFC873F1000-memory.dmp

    Filesize

    10.8MB