Analysis
-
max time kernel
224s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
19-01-2022 15:12
Static task
static1
Behavioral task
behavioral1
Sample
d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd.ps1
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd.ps1
-
Size
3.6MB
-
MD5
bdfc70e3237617d7a4509e9a857234eb
-
SHA1
7b1e093f630ded929fefe02c554d09a1a9d13c54
-
SHA256
d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd
-
SHA512
5bdde5d55b60e7ba1fb448bf95dd45feb2936ebaf53f5a78fa8272b522836d21a884ec5db523d09605f565d382e0015ee055de1976a3093defcc162d43abd857
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
learnatallcost2.ddns.net:9050
Attributes
-
communication_password
4a3e00961a08879c34f91ca0070ea2f5
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2660-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2660-142-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2660-143-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
aspnet_compiler.exepid process 2660 aspnet_compiler.exe 2660 aspnet_compiler.exe 2660 aspnet_compiler.exe 2660 aspnet_compiler.exe 2660 aspnet_compiler.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2752 set thread context of 2660 2752 powershell.exe aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2752 powershell.exe 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exeaspnet_compiler.exesvchost.exedescription pid process Token: SeDebugPrivilege 2752 powershell.exe Token: SeShutdownPrivilege 2660 aspnet_compiler.exe Token: SeSystemtimePrivilege 2968 svchost.exe Token: SeSystemtimePrivilege 2968 svchost.exe Token: SeIncBasePriorityPrivilege 2968 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aspnet_compiler.exepid process 2660 aspnet_compiler.exe 2660 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
powershell.exedescription pid process target process PID 2752 wrote to memory of 2660 2752 powershell.exe aspnet_compiler.exe PID 2752 wrote to memory of 2660 2752 powershell.exe aspnet_compiler.exe PID 2752 wrote to memory of 2660 2752 powershell.exe aspnet_compiler.exe PID 2752 wrote to memory of 2660 2752 powershell.exe aspnet_compiler.exe PID 2752 wrote to memory of 2660 2752 powershell.exe aspnet_compiler.exe PID 2752 wrote to memory of 2660 2752 powershell.exe aspnet_compiler.exe PID 2752 wrote to memory of 2660 2752 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2660-140-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/2660-142-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/2660-143-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/2752-134-0x000002562AB90000-0x000002562AB92000-memory.dmpFilesize
8KB
-
memory/2752-135-0x000002562AB93000-0x000002562AB95000-memory.dmpFilesize
8KB
-
memory/2752-136-0x0000025612720000-0x0000025612742000-memory.dmpFilesize
136KB
-
memory/2752-139-0x000002562AB96000-0x000002562AB98000-memory.dmpFilesize
8KB