Overview
overview
10Static
static
26a3081183...b0.iso
windows7-x64
326a3081183...b0.iso
windows10-2004-x64
3DBUG.ps1
windows7-x64
1DBUG.ps1
windows10-2004-x64
1WinSupport...re.dll
windows7-x64
1WinSupport...re.dll
windows10-2004-x64
1WinSupport...32.dll
windows7-x64
1WinSupport...32.dll
windows10-2004-x64
3WinSupport...EK.dll
windows7-x64
1WinSupport...EK.dll
windows10-2004-x64
1WinSupport...32.dll
windows7-x64
1WinSupport...32.dll
windows10-2004-x64
1WinSupport...32.dll
windows7-x64
1WinSupport...32.dll
windows10-2004-x64
1WinSupport...32.exe
windows7-x64
10WinSupport...32.exe
windows10-2004-x64
10WinSupport...00.dll
windows7-x64
3WinSupport...00.dll
windows10-2004-x64
3WinSupport...pi.dll
windows7-x64
1WinSupport...pi.dll
windows10-2004-x64
1WinSupport...ub.exe
windows7-x64
1WinSupport...ub.exe
windows10-2004-x64
1LOCALES/MSAMRNBD.dll
windows7-x64
1LOCALES/MSAMRNBD.dll
windows10-2004-x64
1LOCALES/MSAMRNBE.dll
windows7-x64
1LOCALES/MSAMRNBE.dll
windows10-2004-x64
1LOCALES/MSAUDDEC.dll
windows7-x64
1LOCALES/MSAUDDEC.dll
windows10-2004-x64
1LOCALES/MSAUDITE.dll
windows7-x64
1LOCALES/MSAUDITE.dll
windows10-2004-x64
1LOCALES/PROTONVP.exe
windows7-x64
7LOCALES/PROTONVP.exe
windows10-2004-x64
7Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-08-2022 17:39
Static task
static1
Behavioral task
behavioral1
Sample
26a30811833fd93ecb266b4e2287e9b30cb99aff38e5109398462946fced4ab0.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26a30811833fd93ecb266b4e2287e9b30cb99aff38e5109398462946fced4ab0.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
DBUG.ps1
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
DBUG.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
WinSupportSn/AudioCapture.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
WinSupportSn/AudioCapture.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
WinSupportSn/HTCTL32.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
WinSupportSn/HTCTL32.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
WinSupportSn/PCICHEK.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
WinSupportSn/PCICHEK.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
WinSupportSn/PCICL32.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
WinSupportSn/PCICL32.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
WinSupportSn/TCCTL32.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
WinSupportSn/TCCTL32.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
WinSupportSn/client32.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
WinSupportSn/client32.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
WinSupportSn/msvcr100.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
WinSupportSn/msvcr100.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
WinSupportSn/pcicapi.dll
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
WinSupportSn/pcicapi.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
WinSupportSn/remcmdstub.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
WinSupportSn/remcmdstub.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
LOCALES/MSAMRNBD.dll
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
LOCALES/MSAMRNBD.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
LOCALES/MSAMRNBE.dll
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
LOCALES/MSAMRNBE.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
LOCALES/MSAUDDEC.dll
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
LOCALES/MSAUDDEC.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
LOCALES/MSAUDITE.dll
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
LOCALES/MSAUDITE.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
LOCALES/PROTONVP.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
LOCALES/PROTONVP.exe
Resource
win10v2004-20220812-en
General
-
Target
DBUG.ps1
-
Size
155B
-
MD5
77b9171025ded8cd2e9d1ba349c77b5c
-
SHA1
4e364f871c99b3c647b33fe02c738f45434e398d
-
SHA256
7d1024920e09142e3d019503536f70ba7e7433cbf7220df99f12fa8fdc492968
-
SHA512
c1d50ed23b913f6d1ccb09607fcfb6269503c4b99cc4699a15c35db5e5ce98130163c1bf12e584954dd09ea4fc645f4c3f95239216c6dbde076f37214de794df
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 1908 powershell.exe 1768 powershell.exe 1972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
powershell.exepowershell.exedescription pid process target process PID 1908 wrote to memory of 1768 1908 powershell.exe powershell.exe PID 1908 wrote to memory of 1768 1908 powershell.exe powershell.exe PID 1908 wrote to memory of 1768 1908 powershell.exe powershell.exe PID 1768 wrote to memory of 1972 1768 powershell.exe powershell.exe PID 1768 wrote to memory of 1972 1768 powershell.exe powershell.exe PID 1768 wrote to memory of 1972 1768 powershell.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\DBUG.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w minimized -nop -ep bypass -command " = Get-Content -path .\locales\twain_32.ini; powershell.exe -w hidden -nop -ep byapss -enc "2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -nop -ep byapss -enc3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5e87a89bf9ba37f60195580d0dabbd5fd
SHA1128d819492802effc9fd542705e7234bdcbda971
SHA2561d03074c24be9e96463810b960e1be81039ca68fe8ff35766490977be8442516
SHA512f0bec32a6ede57ff5ede9aa687f3a54d57d1d44db14f455689e8f05d931b5ec7f46777176170399f8f593402e81f8c9b1d0eb819fea7c3cc553cdf128562c566
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5e87a89bf9ba37f60195580d0dabbd5fd
SHA1128d819492802effc9fd542705e7234bdcbda971
SHA2561d03074c24be9e96463810b960e1be81039ca68fe8ff35766490977be8442516
SHA512f0bec32a6ede57ff5ede9aa687f3a54d57d1d44db14f455689e8f05d931b5ec7f46777176170399f8f593402e81f8c9b1d0eb819fea7c3cc553cdf128562c566
-
memory/1768-65-0x000000001B7B0000-0x000000001BAAF000-memory.dmpFilesize
3.0MB
-
memory/1768-66-0x000000000290B000-0x000000000292A000-memory.dmpFilesize
124KB
-
memory/1768-58-0x0000000000000000-mapping.dmp
-
memory/1768-74-0x000000000290B000-0x000000000292A000-memory.dmpFilesize
124KB
-
memory/1768-61-0x000007FEF3FB0000-0x000007FEF49D3000-memory.dmpFilesize
10.1MB
-
memory/1768-62-0x000007FEF3450000-0x000007FEF3FAD000-memory.dmpFilesize
11.4MB
-
memory/1768-73-0x0000000002904000-0x0000000002907000-memory.dmpFilesize
12KB
-
memory/1768-64-0x0000000002904000-0x0000000002907000-memory.dmpFilesize
12KB
-
memory/1908-54-0x000007FEFBA01000-0x000007FEFBA03000-memory.dmpFilesize
8KB
-
memory/1908-56-0x000007FEF3450000-0x000007FEF3FAD000-memory.dmpFilesize
11.4MB
-
memory/1908-55-0x000007FEF3FB0000-0x000007FEF49D3000-memory.dmpFilesize
10.1MB
-
memory/1908-63-0x000000000290B000-0x000000000292A000-memory.dmpFilesize
124KB
-
memory/1908-57-0x0000000002904000-0x0000000002907000-memory.dmpFilesize
12KB
-
memory/1908-75-0x0000000002904000-0x0000000002907000-memory.dmpFilesize
12KB
-
memory/1908-76-0x000000000290B000-0x000000000292A000-memory.dmpFilesize
124KB
-
memory/1972-67-0x0000000000000000-mapping.dmp
-
memory/1972-70-0x000007FEF3FB0000-0x000007FEF49D3000-memory.dmpFilesize
10.1MB
-
memory/1972-71-0x000007FEF3450000-0x000007FEF3FAD000-memory.dmpFilesize
11.4MB
-
memory/1972-72-0x00000000024F4000-0x00000000024F7000-memory.dmpFilesize
12KB