Analysis
-
max time kernel
25s -
max time network
113s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
07-10-2020 23:06
Static task
static1
Behavioral task
behavioral1
Sample
SunCrypt.ps1
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SunCrypt.ps1
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
SunCrypt.ps1
-
Size
1.6MB
-
MD5
c171bcd34151cbcd48edbce13796e0ed
-
SHA1
2770fec86275dfb1a4a05e2d56bc27a089197666
-
SHA256
63ba6db8c81c60dd9f1a0c7c4a4c51e2e56883f063509ed7b543ad7651fd8806
-
SHA512
d25cbb70dae9bcc49d32c15300734879fe4c1b7ae35cb5affab50e8a61ae7226832b278d846f76f7eedc3a1baf35e2aec4e8c364eab99cddb00c2ffeb97283da
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3888 powershell.exe 3888 powershell.exe 3888 powershell.exe 3888 powershell.exe 2144 powershell.exe 2144 powershell.exe 2144 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3888 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1532 3888 powershell.exe 73 PID 3888 wrote to memory of 1532 3888 powershell.exe 73 PID 1532 wrote to memory of 1860 1532 csc.exe 74 PID 1532 wrote to memory of 1860 1532 csc.exe 74 PID 3888 wrote to memory of 2144 3888 powershell.exe 75 PID 3888 wrote to memory of 2144 3888 powershell.exe 75 PID 3888 wrote to memory of 2144 3888 powershell.exe 75 PID 2144 wrote to memory of 2612 2144 powershell.exe 79 PID 2144 wrote to memory of 2612 2144 powershell.exe 79 PID 2144 wrote to memory of 2612 2144 powershell.exe 79 PID 2612 wrote to memory of 2368 2612 csc.exe 80 PID 2612 wrote to memory of 2368 2612 csc.exe 80 PID 2612 wrote to memory of 2368 2612 csc.exe 80
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SunCrypt.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0opasrvn\0opasrvn.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES50A6.tmp" "c:\Users\Admin\AppData\Local\Temp\0opasrvn\CSC6FE04D4CB042C8A6EDAFF7FB835DA4.TMP"3⤵PID:1860
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\SunCrypt.ps1"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gojft3qm\gojft3qm.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES74D8.tmp" "c:\Users\Admin\AppData\Local\Temp\gojft3qm\CSC69A3CFB1997D4631BDB3B2A2CFE043E8.TMP"4⤵PID:2368
-
-
-