Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 08:15
Static task
static1
Behavioral task
behavioral1
Sample
nlOiE.jpg.ps1
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nlOiE.jpg.ps1
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
nlOiE.jpg.ps1
-
Size
745KB
-
MD5
a20b49ae1d1200c84a0344f5ad3353dd
-
SHA1
3c4e0a61b36c90603d540d83471ab07efe330055
-
SHA256
2834d72111e621f895420cd798a08fd8da8371c1062eb0b9bbc7446d7212804e
-
SHA512
1e80bf08e024d86792c680cf12fc53c6e7fe52d1c1a02c990ce46cda410c4dab6840912b4894cd97f3cf74dfa401bd56eba43187f14fe1735c133fc6bea9f5da
Score
6/10
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 644 set thread context of 3780 644 powershell.exe 76 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 644 powershell.exe 644 powershell.exe 644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 644 powershell.exe Token: SeDebugPrivilege 3780 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3780 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 644 wrote to memory of 3780 644 powershell.exe 76 PID 644 wrote to memory of 3780 644 powershell.exe 76 PID 644 wrote to memory of 3780 644 powershell.exe 76 PID 644 wrote to memory of 3780 644 powershell.exe 76 PID 644 wrote to memory of 3780 644 powershell.exe 76 PID 644 wrote to memory of 3780 644 powershell.exe 76 PID 644 wrote to memory of 3780 644 powershell.exe 76 PID 644 wrote to memory of 3780 644 powershell.exe 76
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\nlOiE.jpg.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3780
-