Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 19:22
Static task
static1
Behavioral task
behavioral1
Sample
1670285f43fbf97e6c53349a9518b7daa4ea147481be976633c1ff39dbc6e09a.ps1
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1670285f43fbf97e6c53349a9518b7daa4ea147481be976633c1ff39dbc6e09a.ps1
Resource
win10v2004-20220414-en
General
-
Target
1670285f43fbf97e6c53349a9518b7daa4ea147481be976633c1ff39dbc6e09a.ps1
-
Size
2KB
-
MD5
eef0c8da7ab6b462a56467f39e952836
-
SHA1
ce494b7212c4d1da3fb6291d796e4718cfaa4338
-
SHA256
1670285f43fbf97e6c53349a9518b7daa4ea147481be976633c1ff39dbc6e09a
-
SHA512
b442b165b9c1d33e5071d00e22f863e7d52d20b6032b8df56277a1f5d1220b47fab4c7ed04e5a72b36daae3e3040f35f81cf3f9768307ebc90349f1af95c5213
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1824 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
powershell.execsc.exedescription pid process target process PID 1824 wrote to memory of 608 1824 powershell.exe csc.exe PID 1824 wrote to memory of 608 1824 powershell.exe csc.exe PID 1824 wrote to memory of 608 1824 powershell.exe csc.exe PID 608 wrote to memory of 1564 608 csc.exe cvtres.exe PID 608 wrote to memory of 1564 608 csc.exe cvtres.exe PID 608 wrote to memory of 1564 608 csc.exe cvtres.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\1670285f43fbf97e6c53349a9518b7daa4ea147481be976633c1ff39dbc6e09a.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3v9tj9fl.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA7D.tmp"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3v9tj9fl.dllFilesize
3KB
MD5d7ed7811dc707faccd4a8808abea2e71
SHA1f32c3c04f96fbc5a2e9b50c51e295029fcd60eb9
SHA256cf7d7e7645383865c3ce44fe80d3395e969da5b9f1cba8041add4358baa4cb39
SHA5129dc36e461b9ac2bcd236436cd4b48dc7bea3488717af7c13ec4bf640798bea6b32408c862096afc739d91762980b435988a6da3378b2693208591b25a30d92e6
-
C:\Users\Admin\AppData\Local\Temp\3v9tj9fl.pdbFilesize
7KB
MD59c950838d4d513d8a46f286b226be19e
SHA1297af6ad26fd1f111271095975074cb8c3e9d068
SHA256f939551a25b4ea9ffb0039cbf2a1cd99d409b2cc5f7fd5f21a90a63c1c03f7e8
SHA512aa8bc789a22439865a3f6aa8b15a7e423e802f5b0446f2612c1c9e8bab0df9475357149857234be7fe989f11085aa0ace3ff8a016503166c46b0844c05c07084
-
C:\Users\Admin\AppData\Local\Temp\RESA7E.tmpFilesize
1KB
MD5b90851c15a63c27fe371b693979ad2b8
SHA18cc2616193a2ffaee5d6a386dc70dc522e5ec120
SHA256c16af3a10b8b89987b66c1401512fa28dd77703224fae86fa4cc3cc86c9017ff
SHA512d628fc27321d702b74ef5ddb3b649856294a6bc48ecf4ae5da1ab8714da5a9bf204e76363e736f41edb3df1cf6caf36007dc61c84a686719a1dbad387a58cc45
-
\??\c:\Users\Admin\AppData\Local\Temp\3v9tj9fl.0.csFilesize
468B
MD552cc39367c8ed123b15e831e52cbd25f
SHA1497593af41731aedd939d2234d8d117c57a6d726
SHA2565a67bcd5871f71a78abf1da47c3529617f34b47a5ab7bde0f1133a33fa751012
SHA512ce6b89a38b94543b6461b5ecc01054c518a6e0daa4962e249a694db198b15602e716098868322eb8275a09d936b4ef3c0242089800bac0ab1926c8bb38d78fcc
-
\??\c:\Users\Admin\AppData\Local\Temp\3v9tj9fl.cmdlineFilesize
309B
MD59ca86c8481528a0f776600214b3e41c0
SHA1af58613ea8325acbe979fdfc18c07ca7c49a460e
SHA2561579c0a355e33cd8df13a43c0446a906d69aa17cd212e6fed08bafb062b9f3ec
SHA51257354d9701e1b8b272b8bac862709cc140559c056ba3d25c555734721aef32a50d2cf82f48d7dc5863c26af6c7332fe6b8b4858c7c29fa46ed4433f98ec246b6
-
\??\c:\Users\Admin\AppData\Local\Temp\CSCA7D.tmpFilesize
652B
MD54763bbe760882f8a44c9c18e681626f7
SHA19cfd25712c46a6c66e874c731688716fea236012
SHA2560c78385cbd778a1bbc63639e07175971ee09fb8975719447483420a993169ffe
SHA5126b312d6bf38689f0b1256f080e5a22ab789881d92b56d40a90715ba51bce752c96147ffd350c4b08322becd0def827bec61fc44d5b9a4981f40812df02079b31
-
memory/608-57-0x0000000000000000-mapping.dmp
-
memory/1564-60-0x0000000000000000-mapping.dmp
-
memory/1824-61-0x00000000024A4000-0x00000000024A7000-memory.dmpFilesize
12KB
-
memory/1824-62-0x00000000024AB000-0x00000000024CA000-memory.dmpFilesize
124KB
-
memory/1824-54-0x000007FEFC511000-0x000007FEFC513000-memory.dmpFilesize
8KB
-
memory/1824-56-0x000000001B7C0000-0x000000001BABF000-memory.dmpFilesize
3.0MB
-
memory/1824-55-0x000007FEF3420000-0x000007FEF3F7D000-memory.dmpFilesize
11.4MB