Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-11-2020 11:51
Static task
static1
Behavioral task
behavioral1
Sample
f0b83514c6f826e695fb34c8264f54e528d355c0765fdcd5f9c3c0e3d6127f54.ps1
Resource
win7v20201028
General
-
Target
f0b83514c6f826e695fb34c8264f54e528d355c0765fdcd5f9c3c0e3d6127f54.ps1
-
Size
171B
-
MD5
d5572751f440766c4c24f20aeb4a368f
-
SHA1
b4556e63d3b4307878e51d5dfab5ea3a4e9e7946
-
SHA256
f0b83514c6f826e695fb34c8264f54e528d355c0765fdcd5f9c3c0e3d6127f54
-
SHA512
19b2c56b04e266df5773c727d3d0137e6e024662286b39d6825c93718c5f93850f0a0536868a9bae72472d92eb00f14512b28cfcb823d737d1c7eabe5f4cbccc
Malware Config
Extracted
trickbot
100003
tar3
102.164.206.129:449
103.131.156.21:449
103.131.157.102:449
103.131.157.161:449
103.146.232.5:449
103.150.68.124:449
103.156.126.232:449
103.30.85.157:449
103.52.47.20:449
-
autorunName:pwgrab
Signatures
-
Blacklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 7 1992 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
_104579.exepid process 740 _104579.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1992 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewermgr.exedescription pid process Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 520 wermgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
_104579.exepid process 740 _104579.exe 740 _104579.exe 740 _104579.exe 740 _104579.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
powershell.exe_104579.exedescription pid process target process PID 1992 wrote to memory of 740 1992 powershell.exe _104579.exe PID 1992 wrote to memory of 740 1992 powershell.exe _104579.exe PID 1992 wrote to memory of 740 1992 powershell.exe _104579.exe PID 1992 wrote to memory of 740 1992 powershell.exe _104579.exe PID 740 wrote to memory of 520 740 _104579.exe wermgr.exe PID 740 wrote to memory of 520 740 _104579.exe wermgr.exe PID 740 wrote to memory of 520 740 _104579.exe wermgr.exe PID 740 wrote to memory of 520 740 _104579.exe wermgr.exe PID 740 wrote to memory of 520 740 _104579.exe wermgr.exe PID 740 wrote to memory of 520 740 _104579.exe wermgr.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\f0b83514c6f826e695fb34c8264f54e528d355c0765fdcd5f9c3c0e3d6127f54.ps11⤵
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\_104579.exe"C:\Users\Admin\AppData\Local\Temp\_104579.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_104579.exeMD5
c252603232987121f642be93e9e39348
SHA19a06574b7f9f732cf6265fe0aff4c133c1cb8314
SHA25677b7bbf78f7a14d808b61a23ea7b29c2bc2e3d8faf62bccf3459182730ea42e3
SHA51270630a8d2c467a6fed99443da2a776c67b6f819c58f5c77d6af8e441a53c891eb169c27a5ee4b5f799d3d51df922d9688d1f4edd55aa6b094d1422291681dc7e
-
C:\Users\Admin\AppData\Local\Temp\_104579.exeMD5
c252603232987121f642be93e9e39348
SHA19a06574b7f9f732cf6265fe0aff4c133c1cb8314
SHA25677b7bbf78f7a14d808b61a23ea7b29c2bc2e3d8faf62bccf3459182730ea42e3
SHA51270630a8d2c467a6fed99443da2a776c67b6f819c58f5c77d6af8e441a53c891eb169c27a5ee4b5f799d3d51df922d9688d1f4edd55aa6b094d1422291681dc7e
-
memory/520-11-0x0000000000000000-mapping.dmp
-
memory/740-7-0x0000000000000000-mapping.dmp
-
memory/740-10-0x0000000001FD0000-0x000000000200A000-memory.dmpFilesize
232KB
-
memory/740-9-0x0000000001E40000-0x0000000001E7E000-memory.dmpFilesize
248KB
-
memory/1992-3-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/1992-6-0x000000001C6F0000-0x000000001C6F1000-memory.dmpFilesize
4KB
-
memory/1992-5-0x000000001C3B0000-0x000000001C3B1000-memory.dmpFilesize
4KB
-
memory/1992-4-0x0000000002010000-0x0000000002011000-memory.dmpFilesize
4KB
-
memory/1992-0-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmpFilesize
9.9MB
-
memory/1992-2-0x000000001AC70000-0x000000001AC71000-memory.dmpFilesize
4KB
-
memory/1992-1-0x0000000002420000-0x0000000002421000-memory.dmpFilesize
4KB