Analysis
-
max time kernel
38s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
02-04-2022 03:45
Static task
static1
Behavioral task
behavioral1
Sample
49c17404c6314b837c9f3b49aba9bf7e.ps1
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
49c17404c6314b837c9f3b49aba9bf7e.ps1
Resource
win10v2004-20220331-en
General
-
Target
49c17404c6314b837c9f3b49aba9bf7e.ps1
-
Size
144KB
-
MD5
49c17404c6314b837c9f3b49aba9bf7e
-
SHA1
dce337aa57cdf134e0c7a7101353777346e964e2
-
SHA256
57d84d42d12c04652cf87f1b1255e0f6ada7674751200ba1d2298941deb5cd44
-
SHA512
8018e8ad4f98cbea91218fd378c3f0a90ab172f6176a6d17016f2d23c1783250fa1467ee2f2023036dd8826816586d90f920f351929ca93d3e710feaf19cb268
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exePowerShell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 1172 mshta.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 660 1172 PowerShell.exe -
Drops file in System32 directory 1 IoCs
Processes:
PowerShell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-594401021-1341801952-2355885667-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exePowerShell.exepid process 1100 powershell.exe 1216 powershell.exe 660 PowerShell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exePowerShell.exedescription pid process Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 1216 powershell.exe Token: SeDebugPrivilege 660 PowerShell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
powershell.exepowershell.exedescription pid process target process PID 1100 wrote to memory of 1216 1100 powershell.exe powershell.exe PID 1100 wrote to memory of 1216 1100 powershell.exe powershell.exe PID 1100 wrote to memory of 1216 1100 powershell.exe powershell.exe PID 1216 wrote to memory of 2004 1216 powershell.exe WScript.exe PID 1216 wrote to memory of 2004 1216 powershell.exe WScript.exe PID 1216 wrote to memory of 2004 1216 powershell.exe WScript.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\49c17404c6314b837c9f3b49aba9bf7e.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\YNBKKUFELDSRHTLNWVKDUS.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\YNBKKUFELDSRHTLNWVKDUS.vbs"3⤵PID:2004
-
C:\Windows\system32\mshta.exemshta.exe C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\YNBKKUFELDSRHTLNWVKDUS.hta1⤵
- Process spawned unexpected child process
- Modifies Internet Explorer settings
PID:1432
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\CDCELITETZDURXFLXDLWOS.ps11⤵
- Process spawned unexpected child process
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\CDCELITETZDURXFLXDLWOS.ps1Filesize
140KB
MD58c477468d34508fb055130af5ff77490
SHA1f2e3b8d26ef690aa2bb82f483731a6cf62798edc
SHA256e931a8c19bdd628a3f041ffb97fee15d8effea525fa48843103e349a6f63182a
SHA51206fd4463c3b893a03054c46dfea56d7909a3af8334a2fbfaad4e7ae1fe8f8455797c06d32eb273e58c0111795617cb414771034ca07bfd40401959c03206d51d
-
C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\YNBKKUFELDSRHTLNWVKDUS.htaFilesize
1KB
MD5413177dd4afafe33eb7c5952d43034c1
SHA10a10af7cc12eb204a11111efa7d56026e3626e19
SHA256ac74a5caefedb5972ab36c73cb14ef26081c2b2252b9c345247544fdeb2e61cf
SHA5123e8dfcbb0b21bbf619b827b5657f98a1270620ef6406fe6dbcd9c75eceeaadddd853e1e05711bc3e1108e3a765228141b591f3ab850a1f272fa0d29775638275
-
C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\YNBKKUFELDSRHTLNWVKDUS.ps1Filesize
457B
MD55f55e2ba5f18fa00afceee9a423c4080
SHA1a44178094ac1cc7c6487a833618e03b810e5ae8a
SHA25600c9f8218e35dd8108257461b6b36e74dabb5054a9de7aca4bfbe0c380107a52
SHA512c13dbd7e45848e1b9b2abdd5f84a38825f73cabf8cc1f6a3443bc923f102b9d2298d070daa27c3494d013ea9de88395f4caf4a691764d833a47e15efe0191601
-
C:\ProgramData\YNBKKUFELDSRHTLNWVKDUS\YNBKKUFELDSRHTLNWVKDUS.vbsFilesize
241B
MD5369b5c8fb7984dcf1b5161895f568db6
SHA1709c93fcc43bd6dc37fa47ecc20ab7590a8e095c
SHA256d1c8024152c41388b106dc3dc45911e69b3f7e555446285701922625d43e1575
SHA512368db5a79283958c65041986d4a47eeb960c6689f724ad79540936acdcf511f1ca1ba3772fc71d442905a3bb97c226317643a397e37aa465a0840f58a4698e57
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD58dcc2a424f2347fbc4cd92c6d992f065
SHA1172b15bdd1450d5ff4b4bacac49ff4fd5becac08
SHA2565df4083442b1b8dc8102242e46b7468c314fad5021c088b4b9cd0bca11190320
SHA512e5ccfbd7251e64c06e035e877d4d2c6afa98161f27582f847bc90a5aa3f7156f945712ecf0f5d49b0c3d825405df752b8f2074e6bb7ce896bb931f8994668fed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD59b3e3b1cbc7a65f63521d31c4554c292
SHA14a9ce006321236479d55a127f3791fde7196a92b
SHA25690242ad92d218fcd6199e9f2feaff2226ffa7a01b59f6dae1920cfa72a551214
SHA5120d626f4fb014d7f925a541dcc279f4cbb7a8e0bcbc9fa545beb166755e8edb903780962c89a57e3fe4e84e1afeb3591d5b7b3a4e600feaa029431a3266cd3257
-
memory/660-76-0x0000000002630000-0x0000000002632000-memory.dmpFilesize
8KB
-
memory/660-77-0x0000000002632000-0x0000000002634000-memory.dmpFilesize
8KB
-
memory/660-78-0x0000000002634000-0x0000000002637000-memory.dmpFilesize
12KB
-
memory/660-79-0x000000000263B000-0x000000000265A000-memory.dmpFilesize
124KB
-
memory/660-74-0x000007FEEDE20000-0x000007FEEE97D000-memory.dmpFilesize
11.4MB
-
memory/1100-59-0x00000000025EB000-0x000000000260A000-memory.dmpFilesize
124KB
-
memory/1100-54-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmpFilesize
8KB
-
memory/1100-58-0x00000000025E4000-0x00000000025E7000-memory.dmpFilesize
12KB
-
memory/1100-56-0x00000000025E0000-0x00000000025E2000-memory.dmpFilesize
8KB
-
memory/1100-57-0x00000000025E2000-0x00000000025E4000-memory.dmpFilesize
8KB
-
memory/1100-55-0x000007FEF3420000-0x000007FEF3F7D000-memory.dmpFilesize
11.4MB
-
memory/1216-69-0x000000000257B000-0x000000000259A000-memory.dmpFilesize
124KB
-
memory/1216-68-0x0000000002574000-0x0000000002577000-memory.dmpFilesize
12KB
-
memory/1216-64-0x000000001B760000-0x000000001BA5F000-memory.dmpFilesize
3.0MB
-
memory/1216-63-0x000007FEF3420000-0x000007FEF3F7D000-memory.dmpFilesize
11.4MB
-
memory/1216-60-0x0000000000000000-mapping.dmp
-
memory/2004-66-0x0000000000000000-mapping.dmp