Analysis
-
max time kernel
47s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-10-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
believe-server.txt.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
believe-server.txt.ps1
Resource
win10v2004-20220812-en
General
-
Target
believe-server.txt.ps1
-
Size
255KB
-
MD5
02d3b46db023e74bf34b36d336e283d8
-
SHA1
fe8d8ebc03e50c39b3c38b6f9aad6e9ea6894528
-
SHA256
aed50a5da5a71dbee227b9de4c9ee68ec20e9814928b16fb231784c3d45ef4a2
-
SHA512
a1b259c6ff0ac4c108dfdf471e325f3938dcb3afe61308e75fe1058b4945076318d3403b36ac145682e53548f31e9260dba1b5e37c83a9476f2d338b4625d07a
-
SSDEEP
6144:wRQRmeIR/ENCsO4/TzhUtZylDwc00ddPqWBYWUaOU8Y85TNkS:SX4PhU1cFPqWt987SS
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POWERSHELL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 1848 POWERSHELL.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Drops file in System32 directory 2 IoCs
Processes:
POWERSHELL.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POWERSHELL.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Modifies registry class 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\ reg.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.exepowershell.exepid process 1992 powershell.exe 1232 powershell.exe 1080 POWERSHELL.exe 1956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.exepowershell.exedescription pid process Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 1232 powershell.exe Token: SeDebugPrivilege 1080 POWERSHELL.exe Token: SeDebugPrivilege 1956 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.execmd.execmd.exedescription pid process target process PID 1992 wrote to memory of 1232 1992 powershell.exe powershell.exe PID 1992 wrote to memory of 1232 1992 powershell.exe powershell.exe PID 1992 wrote to memory of 1232 1992 powershell.exe powershell.exe PID 1232 wrote to memory of 1784 1232 powershell.exe WScript.exe PID 1232 wrote to memory of 1784 1232 powershell.exe WScript.exe PID 1232 wrote to memory of 1784 1232 powershell.exe WScript.exe PID 1080 wrote to memory of 1044 1080 POWERSHELL.exe cmd.exe PID 1080 wrote to memory of 1044 1080 POWERSHELL.exe cmd.exe PID 1080 wrote to memory of 1044 1080 POWERSHELL.exe cmd.exe PID 1044 wrote to memory of 468 1044 cmd.exe reg.exe PID 1044 wrote to memory of 468 1044 cmd.exe reg.exe PID 1044 wrote to memory of 468 1044 cmd.exe reg.exe PID 1044 wrote to memory of 1284 1044 cmd.exe reg.exe PID 1044 wrote to memory of 1284 1044 cmd.exe reg.exe PID 1044 wrote to memory of 1284 1044 cmd.exe reg.exe PID 1044 wrote to memory of 948 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 948 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 948 1044 cmd.exe cmd.exe PID 948 wrote to memory of 1956 948 cmd.exe powershell.exe PID 948 wrote to memory of 1956 948 cmd.exe powershell.exe PID 948 wrote to memory of 1956 948 cmd.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\believe-server.txt.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.vbs"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\POWERSHELL.exePOWERSHELL -noProfilE -ExEcutionPolicy Bypass -Command C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.bat1⤵
- Process spawned unexpected child process
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f3⤵
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\IDontExist.dll /f3⤵
- Registers COM server for autorun
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1'"4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.batFilesize
706B
MD5c5dc49fe999bbd184028c2322216f34f
SHA16de54f03eaf77fe28e88f6ad461b37371da0db0c
SHA25634bd396295ba567cc78dfa910e6e9db8d54b35df73a553c91a407f067bbe2241
SHA512e30064f421f37310bb6a3156e1f54fe7cb7988bc26947ebef7d1933ba7b912077cc855ebb9d5da18aa5a8f92043c5cbab887212f9a5a9810e07eebfc23168454
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.ps1Filesize
3KB
MD5c800c44beca2cfa73dc8113cb84e90d4
SHA1aca79156fb80732bc556472574f04d40b3d4a0e2
SHA2564f72092255c228f5c03546a3c351baae4f3bb9d6eb8aeb0c709c74da6ec9f09d
SHA512e384d770f00c566d3246f0aa67b47033bad4713e0c5341e258b951e26bee4205ec9037732393b06b2966903f216dd0c55791c6d6c067a543c93de53cd126f466
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.vbsFilesize
2KB
MD56be2ca965d6ec7eed5fc2ca94c70be5d
SHA1127a21034790b8f07a4c6c95b64b0253011df068
SHA256a134febf91fe6fe748bfe937aefa809349f3c36a5791516d4cfc5bf7f2db9525
SHA512da9a71167f22f394f72fbf153571b75dbce4642331f5d59b2f6cb7e4f64a3faf7267b188760e74d27804b70f55d83f3e44ae77a6344d80039d59658571d83565
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1Filesize
245KB
MD5fd06e51c5842273d2ba148319aa3dfc3
SHA1c00d3c04e7df097b91ec4fed303f26f42fb6cad2
SHA2567b5de2dfec01f0d73344696e87954013144214a5bdb937c31b2029e4fb2d07aa
SHA512beac6143b82668bd12171925f4b7d80cbe719adb0a5fd6eda19f8a9f1e3d7a287358a30d6e1b56ea16822ffc2aa81994b86a9dddb469012d737d72baf92005f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD57fdcda568aa35710ce4ca68bc664e851
SHA1718334fba5d3ac84148b159e76314d20e5412784
SHA256f72a124d125dca9cade3d797f5b7a89f4475b88ad87bedca76ba34a0394eb226
SHA512421ac7b3a3493b7a5bba5ffe1bfd9cf8a143c4c1ffd36064af953a21604fa240f62e2d534ee6e843b4368eb11b0160dfd03d80445b35467defaa642cf50ffdde
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5a85af1187f6d77ad6b0cd2beaa219f31
SHA108bdee3972c806dead6cfe62be30070397fc778e
SHA2561a5cb1072283194f5d5f35279788c3a44275c67e63e4429f2e51d406262422d1
SHA512a69fffd5c341e8c17e71612b9b893b46278d680dd87a8e78763472eef842fb126cfc259b2b09e8d3abed6365c34d914f55e80dc58a2ee045ab50d5060a6d3e40
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5a85af1187f6d77ad6b0cd2beaa219f31
SHA108bdee3972c806dead6cfe62be30070397fc778e
SHA2561a5cb1072283194f5d5f35279788c3a44275c67e63e4429f2e51d406262422d1
SHA512a69fffd5c341e8c17e71612b9b893b46278d680dd87a8e78763472eef842fb126cfc259b2b09e8d3abed6365c34d914f55e80dc58a2ee045ab50d5060a6d3e40
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/468-83-0x0000000000000000-mapping.dmp
-
memory/948-86-0x0000000000000000-mapping.dmp
-
memory/1044-82-0x0000000000000000-mapping.dmp
-
memory/1080-84-0x00000000027FB000-0x000000000281A000-memory.dmpFilesize
124KB
-
memory/1080-80-0x000000001B7B0000-0x000000001BAAF000-memory.dmpFilesize
3.0MB
-
memory/1080-97-0x00000000027F4000-0x00000000027F7000-memory.dmpFilesize
12KB
-
memory/1080-78-0x00000000027F4000-0x00000000027F7000-memory.dmpFilesize
12KB
-
memory/1080-79-0x000007FEF3940000-0x000007FEF449D000-memory.dmpFilesize
11.4MB
-
memory/1080-98-0x00000000027FB000-0x000000000281A000-memory.dmpFilesize
124KB
-
memory/1080-77-0x000007FEF44A0000-0x000007FEF4EC3000-memory.dmpFilesize
10.1MB
-
memory/1232-65-0x000007FEF2FA0000-0x000007FEF3AFD000-memory.dmpFilesize
11.4MB
-
memory/1232-64-0x000007FEF3B00000-0x000007FEF4523000-memory.dmpFilesize
10.1MB
-
memory/1232-73-0x000000000264B000-0x000000000266A000-memory.dmpFilesize
124KB
-
memory/1232-72-0x0000000002644000-0x0000000002647000-memory.dmpFilesize
12KB
-
memory/1232-70-0x000000000264B000-0x000000000266A000-memory.dmpFilesize
124KB
-
memory/1232-61-0x0000000000000000-mapping.dmp
-
memory/1232-66-0x000000001B750000-0x000000001BA4F000-memory.dmpFilesize
3.0MB
-
memory/1232-67-0x0000000002644000-0x0000000002647000-memory.dmpFilesize
12KB
-
memory/1284-85-0x0000000000000000-mapping.dmp
-
memory/1784-69-0x0000000000000000-mapping.dmp
-
memory/1956-91-0x000007FEF44A0000-0x000007FEF4EC3000-memory.dmpFilesize
10.1MB
-
memory/1956-96-0x0000000001F5B000-0x0000000001F7A000-memory.dmpFilesize
124KB
-
memory/1956-95-0x0000000001F54000-0x0000000001F57000-memory.dmpFilesize
12KB
-
memory/1956-87-0x0000000000000000-mapping.dmp
-
memory/1956-93-0x0000000001F54000-0x0000000001F57000-memory.dmpFilesize
12KB
-
memory/1956-92-0x000007FEF3940000-0x000007FEF449D000-memory.dmpFilesize
11.4MB
-
memory/1992-60-0x000000000259B000-0x00000000025BA000-memory.dmpFilesize
124KB
-
memory/1992-58-0x000000000259B000-0x00000000025BA000-memory.dmpFilesize
124KB
-
memory/1992-59-0x0000000002594000-0x0000000002597000-memory.dmpFilesize
12KB
-
memory/1992-56-0x000007FEF2FA0000-0x000007FEF3AFD000-memory.dmpFilesize
11.4MB
-
memory/1992-54-0x000007FEFBE81000-0x000007FEFBE83000-memory.dmpFilesize
8KB
-
memory/1992-76-0x000000000259B000-0x00000000025BA000-memory.dmpFilesize
124KB
-
memory/1992-57-0x0000000002594000-0x0000000002597000-memory.dmpFilesize
12KB
-
memory/1992-55-0x000007FEF3B00000-0x000007FEF4523000-memory.dmpFilesize
10.1MB