Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 01:21
Static task
static1
Behavioral task
behavioral1
Sample
e1650d31f00d38b98cf8aa48a2e5fdd4bb30dd1177546abe3053bdcff25cefcc.ps1
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e1650d31f00d38b98cf8aa48a2e5fdd4bb30dd1177546abe3053bdcff25cefcc.ps1
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
e1650d31f00d38b98cf8aa48a2e5fdd4bb30dd1177546abe3053bdcff25cefcc.ps1
-
Size
5.1MB
-
MD5
b49b3852097431b773e6dcf4c314f87a
-
SHA1
f0952ec5d3c90398e1335f1fad00b80dbd4c5a32
-
SHA256
e1650d31f00d38b98cf8aa48a2e5fdd4bb30dd1177546abe3053bdcff25cefcc
-
SHA512
0274aa4b490f226174fb5ea9f993ad38431438846313fde54682ef69a73fbebb26e51bf2f8b3e5fc604dab6e765765f5fd1d6f6bfefb928cb8a2f5ac33561291
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1584 powershell.exe 1584 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1764 explorer.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1584 powershell.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeBackupPrivilege 1760 vssvc.exe Token: SeRestorePrivilege 1760 vssvc.exe Token: SeAuditPrivilege 1760 vssvc.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1584 wrote to memory of 556 1584 powershell.exe 28 PID 1584 wrote to memory of 556 1584 powershell.exe 28 PID 1584 wrote to memory of 556 1584 powershell.exe 28 PID 556 wrote to memory of 1296 556 csc.exe 29 PID 556 wrote to memory of 1296 556 csc.exe 29 PID 556 wrote to memory of 1296 556 csc.exe 29 PID 1584 wrote to memory of 1428 1584 powershell.exe 30 PID 1584 wrote to memory of 1428 1584 powershell.exe 30 PID 1584 wrote to memory of 1428 1584 powershell.exe 30 PID 1428 wrote to memory of 540 1428 csc.exe 31 PID 1428 wrote to memory of 540 1428 csc.exe 31 PID 1428 wrote to memory of 540 1428 csc.exe 31 PID 1584 wrote to memory of 1380 1584 powershell.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e1650d31f00d38b98cf8aa48a2e5fdd4bb30dd1177546abe3053bdcff25cefcc.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q7a37ulc.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD827.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD826.tmp"4⤵PID:1296
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\osezxfjq.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE6C7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE6C6.tmp"4⤵PID:540
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1764
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1760