Analysis
-
max time kernel
52s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2022, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
blessed1.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
blessed1.ps1
Resource
win10v2004-20220812-en
General
-
Target
blessed1.ps1
-
Size
540KB
-
MD5
297b8e10650755c2076d5ea6c298d7b5
-
SHA1
3ef255b390d42017069762e5b2f068a2dbb5bfe5
-
SHA256
3db43c5dc157dc3380f32a9814c1e590a1cb1fe0e9ba35706e56888de9230b4c
-
SHA512
04fb650b1eb36296ac4b3ff7d80f0fa077214e899f9c6139bbec3f6b7ddee6980e15989b337f9f4f176e994a7a25f69e64c4921e814298eacb8baa82f9648b12
-
SSDEEP
12288:VXD4xmh3fnwCiEgzChnmYyUX3EjZrk2SvvGrdKNOQCqe6YG:VXEG
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3760 2332 POWERSHELL.exe 72 -
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
resource yara_rule behavioral2/memory/3308-155-0x000000000042060E-mapping.dmp family_snakekeylogger behavioral2/memory/3308-160-0x00000000011C0000-0x00000000011E6000-memory.dmp family_snakekeylogger -
Registers COM server for autorun 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 3308 1492 powershell.exe 97 -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1116 reg.exe 1084 reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2752 powershell.exe 2752 powershell.exe 740 powershell.exe 740 powershell.exe 3760 POWERSHELL.exe 3760 POWERSHELL.exe 1492 powershell.exe 1492 powershell.exe 3308 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeDebugPrivilege 3760 POWERSHELL.exe Token: SeIncreaseQuotaPrivilege 740 powershell.exe Token: SeSecurityPrivilege 740 powershell.exe Token: SeTakeOwnershipPrivilege 740 powershell.exe Token: SeLoadDriverPrivilege 740 powershell.exe Token: SeSystemProfilePrivilege 740 powershell.exe Token: SeSystemtimePrivilege 740 powershell.exe Token: SeProfSingleProcessPrivilege 740 powershell.exe Token: SeIncBasePriorityPrivilege 740 powershell.exe Token: SeCreatePagefilePrivilege 740 powershell.exe Token: SeBackupPrivilege 740 powershell.exe Token: SeRestorePrivilege 740 powershell.exe Token: SeShutdownPrivilege 740 powershell.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeSystemEnvironmentPrivilege 740 powershell.exe Token: SeRemoteShutdownPrivilege 740 powershell.exe Token: SeUndockPrivilege 740 powershell.exe Token: SeManageVolumePrivilege 740 powershell.exe Token: 33 740 powershell.exe Token: 34 740 powershell.exe Token: 35 740 powershell.exe Token: 36 740 powershell.exe Token: SeIncreaseQuotaPrivilege 740 powershell.exe Token: SeSecurityPrivilege 740 powershell.exe Token: SeTakeOwnershipPrivilege 740 powershell.exe Token: SeLoadDriverPrivilege 740 powershell.exe Token: SeSystemProfilePrivilege 740 powershell.exe Token: SeSystemtimePrivilege 740 powershell.exe Token: SeProfSingleProcessPrivilege 740 powershell.exe Token: SeIncBasePriorityPrivilege 740 powershell.exe Token: SeCreatePagefilePrivilege 740 powershell.exe Token: SeBackupPrivilege 740 powershell.exe Token: SeRestorePrivilege 740 powershell.exe Token: SeShutdownPrivilege 740 powershell.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeSystemEnvironmentPrivilege 740 powershell.exe Token: SeRemoteShutdownPrivilege 740 powershell.exe Token: SeUndockPrivilege 740 powershell.exe Token: SeManageVolumePrivilege 740 powershell.exe Token: 33 740 powershell.exe Token: 34 740 powershell.exe Token: 35 740 powershell.exe Token: 36 740 powershell.exe Token: SeIncreaseQuotaPrivilege 740 powershell.exe Token: SeSecurityPrivilege 740 powershell.exe Token: SeTakeOwnershipPrivilege 740 powershell.exe Token: SeLoadDriverPrivilege 740 powershell.exe Token: SeSystemProfilePrivilege 740 powershell.exe Token: SeSystemtimePrivilege 740 powershell.exe Token: SeProfSingleProcessPrivilege 740 powershell.exe Token: SeIncBasePriorityPrivilege 740 powershell.exe Token: SeCreatePagefilePrivilege 740 powershell.exe Token: SeBackupPrivilege 740 powershell.exe Token: SeRestorePrivilege 740 powershell.exe Token: SeShutdownPrivilege 740 powershell.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeSystemEnvironmentPrivilege 740 powershell.exe Token: SeRemoteShutdownPrivilege 740 powershell.exe Token: SeUndockPrivilege 740 powershell.exe Token: SeManageVolumePrivilege 740 powershell.exe Token: 33 740 powershell.exe Token: 34 740 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2752 wrote to memory of 740 2752 powershell.exe 88 PID 2752 wrote to memory of 740 2752 powershell.exe 88 PID 740 wrote to memory of 4352 740 powershell.exe 89 PID 740 wrote to memory of 4352 740 powershell.exe 89 PID 3760 wrote to memory of 1888 3760 POWERSHELL.exe 92 PID 3760 wrote to memory of 1888 3760 POWERSHELL.exe 92 PID 1888 wrote to memory of 1116 1888 cmd.exe 93 PID 1888 wrote to memory of 1116 1888 cmd.exe 93 PID 1888 wrote to memory of 1084 1888 cmd.exe 94 PID 1888 wrote to memory of 1084 1888 cmd.exe 94 PID 1888 wrote to memory of 2336 1888 cmd.exe 95 PID 1888 wrote to memory of 2336 1888 cmd.exe 95 PID 2336 wrote to memory of 1492 2336 cmd.exe 96 PID 2336 wrote to memory of 1492 2336 cmd.exe 96 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 PID 1492 wrote to memory of 3308 1492 powershell.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\blessed1.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\NJWDBWOESPINHONHYKUWZS\NJWDBWOESPINHONHYKUWZS.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\NJWDBWOESPINHONHYKUWZS\NJWDBWOESPINHONHYKUWZS.vbs"3⤵PID:4352
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\POWERSHELL.exePOWERSHELL -noProfilE -ExEcutionPolicy Bypass -Command C:\ProgramData\NJWDBWOESPINHONHYKUWZS\NJWDBWOESPINHONHYKUWZS.bat1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\NJWDBWOESPINHONHYKUWZS\NJWDBWOESPINHONHYKUWZS.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f3⤵
- Modifies registry class
- Modifies registry key
PID:1116
-
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\IDontExist.dll /f3⤵
- Registers COM server for autorun
- Modifies registry class
- Modifies registry key
PID:1084
-
-
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\NJWDBWOESPINHONHYKUWZS\CYEBRRULVISVNIVUDGZPTV.ps1'"3⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\NJWDBWOESPINHONHYKUWZS\CYEBRRULVISVNIVUDGZPTV.ps1'"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:3308
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5cf926b0be724d46e228175953d33a988
SHA14b87320b4a3b75be7414f82e3cc83abed0f2123b
SHA2563a0b71b1c003590b1eb5a0f5e5e1ccf5af14fca8a264ff1f01c153c2a3806e00
SHA512349ac83e0e2e14c6e9089020ce2c8f07800381840ea5ea574bc6b9ccf67ab603112efb9188950d495f1c18ffd36096aaf6a74d5bbaddc7a3ab13bc24ca7b3b40
-
Filesize
693B
MD55a52e1c0f7e19f6b96c875310238e048
SHA16a017b2933ffb51c025fce852abd0e356b0e2b1d
SHA25614e860c94a8664901099340f7a4f97362a64ef149a53e5df31a5a4d383a51d2a
SHA512ddeb3ffd4c2c88c264c6c3587a33ac229afd44ed3a82fcf244e3069e8e0a28be328fded4b40d438185ccacbefb5ccd5d1df40292be825b0f9587b63fbc781f5d
-
Filesize
3KB
MD521df908f451a93e32692c2fe8b34162e
SHA125f4e917312bf21ad9289348b682a292e657cc4d
SHA256ce05b804fdf14f27ab9617e55a7b431bba49325ae749a97a3ee9cff469b36e2e
SHA5126f4d3f109fec3a9d92f36fae2d1eb2bea4c59dbe2b73e92e7f2175f2ca985b9c71f8905d4e6589d4cc010497403729bf7b718efb437f47fd819f16d74bea5ace
-
Filesize
2KB
MD51f420d8b494afee108abdbdce860be6d
SHA106029153e26d9a107f5831ab001f3e43ae6d4aae
SHA25651bfac3e3d2230f21591bd59362c2f657a69614ea893a64644879f3010540275
SHA512bf1e5b622141bb19096f6b8674b92579d0a045f7919beebdcca57f620900836e43d06f17d938697924942b0746087ddad902129887b7da3788256c0a0356d217
-
Filesize
3KB
MD500e7da020005370a518c26d5deb40691
SHA1389b34fdb01997f1de74a5a2be0ff656280c0432
SHA256a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe
SHA5129a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf
-
Filesize
1KB
MD571444def27770d9071039d005d0323b7
SHA1cef8654e95495786ac9347494f4417819373427e
SHA2568438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9
SHA512a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034
-
Filesize
1KB
MD575b4b2eecda41cec059c973abb1114c0
SHA111dadf4817ead21b0340ce529ee9bbd7f0422668
SHA2565540f4ea6d18b1aa94a3349652133a4f6641d456757499b7ab12e7ee8f396134
SHA51287feaf17bd331ed6afd9079fefb1d8f5d3911ababf8ea7542be16c946301a7172a5dc46d249b2192376957468d75bf1c99752529ca77ec0aa78a8d054b3a6626
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b