Analysis
-
max time kernel
25s -
max time network
112s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
05-10-2020 08:48
Static task
static1
Behavioral task
behavioral1
Sample
63ba6db8c81c60dd9f1a0c7c4a4c51e2e56883f063509ed7b543ad7651fd8806.ps1
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
63ba6db8c81c60dd9f1a0c7c4a4c51e2e56883f063509ed7b543ad7651fd8806.ps1
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
63ba6db8c81c60dd9f1a0c7c4a4c51e2e56883f063509ed7b543ad7651fd8806.ps1
-
Size
1.6MB
-
MD5
c171bcd34151cbcd48edbce13796e0ed
-
SHA1
2770fec86275dfb1a4a05e2d56bc27a089197666
-
SHA256
63ba6db8c81c60dd9f1a0c7c4a4c51e2e56883f063509ed7b543ad7651fd8806
-
SHA512
d25cbb70dae9bcc49d32c15300734879fe4c1b7ae35cb5affab50e8a61ae7226832b278d846f76f7eedc3a1baf35e2aec4e8c364eab99cddb00c2ffeb97283da
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1568 powershell.exe 1568 powershell.exe 1568 powershell.exe 1568 powershell.exe 3252 powershell.exe 3252 powershell.exe 3252 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1568 powershell.exe Token: SeDebugPrivilege 3252 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1568 wrote to memory of 4044 1568 powershell.exe 73 PID 1568 wrote to memory of 4044 1568 powershell.exe 73 PID 4044 wrote to memory of 1768 4044 csc.exe 74 PID 4044 wrote to memory of 1768 4044 csc.exe 74 PID 1568 wrote to memory of 3252 1568 powershell.exe 75 PID 1568 wrote to memory of 3252 1568 powershell.exe 75 PID 1568 wrote to memory of 3252 1568 powershell.exe 75 PID 3252 wrote to memory of 2024 3252 powershell.exe 79 PID 3252 wrote to memory of 2024 3252 powershell.exe 79 PID 3252 wrote to memory of 2024 3252 powershell.exe 79 PID 2024 wrote to memory of 1332 2024 csc.exe 80 PID 2024 wrote to memory of 1332 2024 csc.exe 80 PID 2024 wrote to memory of 1332 2024 csc.exe 80
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\63ba6db8c81c60dd9f1a0c7c4a4c51e2e56883f063509ed7b543ad7651fd8806.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3tblyush\3tblyush.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7B11.tmp" "c:\Users\Admin\AppData\Local\Temp\3tblyush\CSC9475ABF2C35D458A902CF8BC59E2C2.TMP"3⤵PID:1768
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\63ba6db8c81c60dd9f1a0c7c4a4c51e2e56883f063509ed7b543ad7651fd8806.ps1"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cynytwao\cynytwao.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA05C.tmp" "c:\Users\Admin\AppData\Local\Temp\cynytwao\CSC5AC2447FF71741D0BE9ED2F8DD21D044.TMP"4⤵PID:1332
-
-
-