Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 06:03
Static task
static1
Behavioral task
behavioral1
Sample
8d17d3a5f3b094938396495331e3dde990d8903736e46318bab7a7af20f9c31d.ps1
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8d17d3a5f3b094938396495331e3dde990d8903736e46318bab7a7af20f9c31d.ps1
Resource
win10v2004-20220414-en
General
-
Target
8d17d3a5f3b094938396495331e3dde990d8903736e46318bab7a7af20f9c31d.ps1
-
Size
2KB
-
MD5
68d9b2bda86ac6ce7dbfd3ee9fd12508
-
SHA1
89ecae4065f2f2d7bdd3e910da4bddcd350afbcf
-
SHA256
8d17d3a5f3b094938396495331e3dde990d8903736e46318bab7a7af20f9c31d
-
SHA512
b62d41e49a2b87ad9c9fb18a02891833c08499a05099e964a6ba75c2cfffc46369d611462f6b1dec3b93ed17f2c3c015f909127738b773c77770d80a0029e79c
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 18 4848 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 1424 powershell.exe 1424 powershell.exe 4848 powershell.exe 4848 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 4848 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
powershell.exepowershell.execsc.exedescription pid process target process PID 1424 wrote to memory of 4848 1424 powershell.exe powershell.exe PID 1424 wrote to memory of 4848 1424 powershell.exe powershell.exe PID 1424 wrote to memory of 4848 1424 powershell.exe powershell.exe PID 4848 wrote to memory of 1512 4848 powershell.exe csc.exe PID 4848 wrote to memory of 1512 4848 powershell.exe csc.exe PID 4848 wrote to memory of 1512 4848 powershell.exe csc.exe PID 1512 wrote to memory of 2024 1512 csc.exe cvtres.exe PID 1512 wrote to memory of 2024 1512 csc.exe cvtres.exe PID 1512 wrote to memory of 2024 1512 csc.exe cvtres.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8d17d3a5f3b094938396495331e3dde990d8903736e46318bab7a7af20f9c31d.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\syswow64\windowspowershell\v1.0\powershell.exe"c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bvtjzcvx\bvtjzcvx.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES687E.tmp" "c:\Users\Admin\AppData\Local\Temp\bvtjzcvx\CSC1AD815FFB6574C52A2BA3279F548758C.TMP"4⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD593678e82d776686aa54c42b8a98e6cbc
SHA1802939dfed99ac74814c4371388b204c5810241d
SHA256da32a79a8e04cbafb1c5980b3d6225f4705010df5eb45d464cd5bf6b642d7841
SHA5120b412a1e11c0639d72f6a58c661ecc43da021c010c4d1e66051c5a376ebab287480bbf663345c9bd2a79ec3a35a9788cf04d74d612449f76fe2c87576cd13520
-
C:\Users\Admin\AppData\Local\Temp\RES687E.tmpFilesize
1KB
MD5fc2bcf11d4fb591f68cdbad562fc96c3
SHA105999d2803af59dc0e8b5e2ccb6d1b3bd394675c
SHA256a1f6de606dc8221974338faa5df42c7b1c8bb33764b6678d5624fec7cce25b78
SHA5126023d1eb60f03d47fc9134136a329048432af637b062fe30f1dca151939609b9efa83ed7e3f77ea68ed068dc7bb20a3f1a35311baae5e8a0e2874cf6c82694a8
-
C:\Users\Admin\AppData\Local\Temp\bvtjzcvx\bvtjzcvx.dllFilesize
3KB
MD542c316a0a1cc8406d599b577056a4df0
SHA1b6fede1e83635fb41830186fef34f8b0c149a1ee
SHA256f661317cd4b94f57931be8309947c0400f2f39e03b8d072bee42d292565d0232
SHA5125f20893e426f3bda8f962533036aac98998e0ad1a08dea0c960a24b3c5e1cd3abf4ccc54c89c5c8957efadfd79dcd633172427a9ad1d2a6978f077bb6c5a0855
-
\??\c:\Users\Admin\AppData\Local\Temp\bvtjzcvx\CSC1AD815FFB6574C52A2BA3279F548758C.TMPFilesize
652B
MD5a0bd56c4524a54838bbc46464dc26e19
SHA13dbdbce99225b8a2a1f18924fabfecc3228a745e
SHA256b531c312d06a7533e8eaf6fbc2be5dcfc327c96af4a832845f754a4ab50c8994
SHA512f7baaf22eed5afdf5197dd82db4f303ef031215ef53cc0a9650cc43918f050345b9887fd30046c8d59194d26d0bbc41ababce524220dd7ba9ffbcb8d5b81cb3a
-
\??\c:\Users\Admin\AppData\Local\Temp\bvtjzcvx\bvtjzcvx.0.csFilesize
769B
MD5e9229c2b2f7494c86966a0c45419f53e
SHA18cc6e18d196930758675891d9c9761b0812e8451
SHA25602436cabe1b2c68359a333b522304c53b2a721123f935991e6f6684d1fab1def
SHA5122f1a42a5c0de45f412e13cad05b836d05d80aeb7bc89e723edc8c495d65e4d9fb3d2748fefe19cb9857cbefdb175a02f9b7ea4dd9afb729550694360d332219b
-
\??\c:\Users\Admin\AppData\Local\Temp\bvtjzcvx\bvtjzcvx.cmdlineFilesize
324B
MD5b7f716f31e95f5ae46f86ed913f1cab7
SHA156ef11eaef9dfa3c16335bb255586c033d05bf94
SHA256f7784ede1cc1f2198aee0245807bc18b4486fa997c01f63fd1070bad96f1bd54
SHA51220cbe4f940dbf0a84dcaea5e3063052d833063a318a4c96a7570810682b3b2d1ba1ad1b6f2915f60c9a2dca252db0258ad79bdc9d01ba0b564684e83e36405f0
-
memory/1424-131-0x00007FFCB6ED0000-0x00007FFCB7991000-memory.dmpFilesize
10.8MB
-
memory/1424-132-0x00000290BBD70000-0x00000290BBEE6000-memory.dmpFilesize
1.5MB
-
memory/1424-133-0x00000290BC100000-0x00000290BC30A000-memory.dmpFilesize
2.0MB
-
memory/1424-130-0x00000290A1870000-0x00000290A1892000-memory.dmpFilesize
136KB
-
memory/1512-144-0x0000000000000000-mapping.dmp
-
memory/2024-147-0x0000000000000000-mapping.dmp
-
memory/4848-135-0x0000000004E80000-0x0000000004EB6000-memory.dmpFilesize
216KB
-
memory/4848-143-0x0000000006B50000-0x0000000006B6A000-memory.dmpFilesize
104KB
-
memory/4848-142-0x00000000074B0000-0x0000000007B2A000-memory.dmpFilesize
6.5MB
-
memory/4848-140-0x0000000006570000-0x000000000658E000-memory.dmpFilesize
120KB
-
memory/4848-139-0x0000000005D00000-0x0000000005D66000-memory.dmpFilesize
408KB
-
memory/4848-138-0x0000000005C90000-0x0000000005CF6000-memory.dmpFilesize
408KB
-
memory/4848-137-0x0000000005480000-0x00000000054A2000-memory.dmpFilesize
136KB
-
memory/4848-136-0x00000000055F0000-0x0000000005C18000-memory.dmpFilesize
6.2MB
-
memory/4848-134-0x0000000000000000-mapping.dmp