Analysis
-
max time kernel
67s -
max time network
70s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-03-2021 08:36
Static task
static1
Behavioral task
behavioral1
Sample
load.ps1
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
load.ps1
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
load.ps1
-
Size
1.4MB
-
MD5
09a05a2212bd2c0fe0e2881401fbff17
-
SHA1
fbb6f8dae1753cd2a282ee161bc5496486cc06f7
-
SHA256
b41a303a4caa71fa260dd601a796033d8bfebcaa6bd9dfd7ad956fac5229a735
-
SHA512
8d0dd3a7d6adaa690a3f7625a573b8c50cfa9d40fa17836b7e8ab8a10bfe67f4eaf0720cedda0c1d2986e7e70770a097ad8af2a9e24ccd595514a0384cbc275f
Score
10/10
Malware Config
Signatures
-
SunCrypt Ransomware
Family which threatens to leak data alongside encrypting files. Has claimed to be collaborating with the Maze ransomware group.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 8 744 powershell.exe 9 744 powershell.exe -
Drops desktop.ini file(s) 35 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini powershell.exe File opened for modification C:\Users\Public\Desktop\desktop.ini powershell.exe File opened for modification C:\Users\Public\Documents\desktop.ini powershell.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\X6969WXQ\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Music\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini powershell.exe File opened for modification C:\Users\Public\Libraries\desktop.ini powershell.exe File opened for modification C:\Users\Public\Pictures\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Documents\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Searches\desktop.ini powershell.exe File opened for modification C:\Users\Public\desktop.ini powershell.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini powershell.exe File opened for modification C:\Users\Public\Music\desktop.ini powershell.exe File opened for modification C:\Users\Public\Videos\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\5JH7AFHU\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Links\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini powershell.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini powershell.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\6O9TWDTA\desktop.ini powershell.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\XHJ74TZW\desktop.ini powershell.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini powershell.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini powershell.exe File opened for modification C:\Users\Public\Downloads\desktop.ini powershell.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini powershell.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: powershell.exe File opened (read-only) \??\V: powershell.exe File opened (read-only) \??\N: powershell.exe File opened (read-only) \??\M: powershell.exe File opened (read-only) \??\R: powershell.exe File opened (read-only) \??\U: powershell.exe File opened (read-only) \??\O: powershell.exe File opened (read-only) \??\G: powershell.exe File opened (read-only) \??\W: powershell.exe File opened (read-only) \??\E: powershell.exe File opened (read-only) \??\I: powershell.exe File opened (read-only) \??\K: powershell.exe File opened (read-only) \??\B: powershell.exe File opened (read-only) \??\Q: powershell.exe File opened (read-only) \??\T: powershell.exe File opened (read-only) \??\S: powershell.exe File opened (read-only) \??\X: powershell.exe File opened (read-only) \??\J: powershell.exe File opened (read-only) \??\L: powershell.exe File opened (read-only) \??\Z: powershell.exe File opened (read-only) \??\Y: powershell.exe File opened (read-only) \??\P: powershell.exe File opened (read-only) \??\A: powershell.exe File opened (read-only) \??\F: powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1096 powershell.exe 1096 powershell.exe 744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1096 powershell.exe Token: SeDebugPrivilege 744 powershell.exe Token: SeBackupPrivilege 1924 vssvc.exe Token: SeRestorePrivilege 1924 vssvc.exe Token: SeAuditPrivilege 1924 vssvc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1352 1096 powershell.exe 30 PID 1096 wrote to memory of 1352 1096 powershell.exe 30 PID 1096 wrote to memory of 1352 1096 powershell.exe 30 PID 1352 wrote to memory of 292 1352 csc.exe 31 PID 1352 wrote to memory of 292 1352 csc.exe 31 PID 1352 wrote to memory of 292 1352 csc.exe 31 PID 1096 wrote to memory of 744 1096 powershell.exe 32 PID 1096 wrote to memory of 744 1096 powershell.exe 32 PID 1096 wrote to memory of 744 1096 powershell.exe 32 PID 1096 wrote to memory of 744 1096 powershell.exe 32 PID 744 wrote to memory of 1484 744 powershell.exe 34 PID 744 wrote to memory of 1484 744 powershell.exe 34 PID 744 wrote to memory of 1484 744 powershell.exe 34 PID 744 wrote to memory of 1484 744 powershell.exe 34 PID 1484 wrote to memory of 1088 1484 csc.exe 35 PID 1484 wrote to memory of 1088 1484 csc.exe 35 PID 1484 wrote to memory of 1088 1484 csc.exe 35 PID 1484 wrote to memory of 1088 1484 csc.exe 35
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\load.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tv2e22er\tv2e22er.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4885.tmp" "c:\Users\Admin\AppData\Local\Temp\tv2e22er\CSC4116CAC65DD4A4F80A2EF608D84EE62.TMP"3⤵PID:292
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\load.ps1"2⤵
- Blocklisted process makes network request
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nn2egaw5\nn2egaw5.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES706F.tmp" "c:\Users\Admin\AppData\Local\Temp\nn2egaw5\CSC8EB3440E7CC4AE9993B85AB26CFDCE7.TMP"4⤵PID:1088
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924