Analysis
-
max time kernel
25s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 06:28
Static task
static1
Behavioral task
behavioral1
Sample
nlOiE.jpg.ps1
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nlOiE.jpg.ps1
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
nlOiE.jpg.ps1
-
Size
745KB
-
MD5
a20b49ae1d1200c84a0344f5ad3353dd
-
SHA1
3c4e0a61b36c90603d540d83471ab07efe330055
-
SHA256
2834d72111e621f895420cd798a08fd8da8371c1062eb0b9bbc7446d7212804e
-
SHA512
1e80bf08e024d86792c680cf12fc53c6e7fe52d1c1a02c990ce46cda410c4dab6840912b4894cd97f3cf74dfa401bd56eba43187f14fe1735c133fc6bea9f5da
Score
6/10
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 884 set thread context of 192 884 powershell.exe 77 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 884 powershell.exe 884 powershell.exe 884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 884 powershell.exe Token: SeDebugPrivilege 192 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 192 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 884 wrote to memory of 192 884 powershell.exe 77 PID 884 wrote to memory of 192 884 powershell.exe 77 PID 884 wrote to memory of 192 884 powershell.exe 77 PID 884 wrote to memory of 192 884 powershell.exe 77 PID 884 wrote to memory of 192 884 powershell.exe 77 PID 884 wrote to memory of 192 884 powershell.exe 77 PID 884 wrote to memory of 192 884 powershell.exe 77 PID 884 wrote to memory of 192 884 powershell.exe 77
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\nlOiE.jpg.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:192
-