Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-10-2022 07:22
Static task
static1
Behavioral task
behavioral1
Sample
chris-server.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
chris-server.ps1
Resource
win10v2004-20220812-en
General
-
Target
chris-server.ps1
-
Size
255KB
-
MD5
7a82388b85eb4abac99ef658d7b0d1cf
-
SHA1
45cef26f5d4397ea8155857520a11a141ba465e2
-
SHA256
44b973071a7a8b22ab1a3defe1b2ec8028c39de957180e9a71e09b48c0d8a641
-
SHA512
2a112f190f56d9d2aad7e3b68369e45c89650334561ce9b7eca37a24e4b81089282b1889e9f0df501ae6c9f4430b686ec6a9c46d140740d002c143520c6dd723
-
SSDEEP
6144:wRQRmeIR/ENCsO8cruAw9GH8dIhpk/Gkk4DwS:SXY7kHhpckLS
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POWERSHELL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 1052 POWERSHELL.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Drops file in System32 directory 2 IoCs
Processes:
POWERSHELL.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POWERSHELL.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Modifies registry class 4 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\ reg.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} reg.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.exepowershell.exepid process 1736 powershell.exe 1280 powershell.exe 1656 POWERSHELL.exe 980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.exepowershell.exedescription pid process Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeDebugPrivilege 1656 POWERSHELL.exe Token: SeDebugPrivilege 980 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.execmd.execmd.exedescription pid process target process PID 1736 wrote to memory of 1280 1736 powershell.exe powershell.exe PID 1736 wrote to memory of 1280 1736 powershell.exe powershell.exe PID 1736 wrote to memory of 1280 1736 powershell.exe powershell.exe PID 1280 wrote to memory of 436 1280 powershell.exe WScript.exe PID 1280 wrote to memory of 436 1280 powershell.exe WScript.exe PID 1280 wrote to memory of 436 1280 powershell.exe WScript.exe PID 1656 wrote to memory of 1380 1656 POWERSHELL.exe cmd.exe PID 1656 wrote to memory of 1380 1656 POWERSHELL.exe cmd.exe PID 1656 wrote to memory of 1380 1656 POWERSHELL.exe cmd.exe PID 1380 wrote to memory of 956 1380 cmd.exe reg.exe PID 1380 wrote to memory of 956 1380 cmd.exe reg.exe PID 1380 wrote to memory of 956 1380 cmd.exe reg.exe PID 1380 wrote to memory of 872 1380 cmd.exe reg.exe PID 1380 wrote to memory of 872 1380 cmd.exe reg.exe PID 1380 wrote to memory of 872 1380 cmd.exe reg.exe PID 1380 wrote to memory of 960 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 960 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 960 1380 cmd.exe cmd.exe PID 960 wrote to memory of 980 960 cmd.exe powershell.exe PID 960 wrote to memory of 980 960 cmd.exe powershell.exe PID 960 wrote to memory of 980 960 cmd.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\chris-server.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.vbs"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\POWERSHELL.exePOWERSHELL -noProfilE -ExEcutionPolicy Bypass -Command C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.bat1⤵
- Process spawned unexpected child process
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f3⤵
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\IDontExist.dll /f3⤵
- Registers COM server for autorun
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1'"4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.batFilesize
706B
MD5c5dc49fe999bbd184028c2322216f34f
SHA16de54f03eaf77fe28e88f6ad461b37371da0db0c
SHA25634bd396295ba567cc78dfa910e6e9db8d54b35df73a553c91a407f067bbe2241
SHA512e30064f421f37310bb6a3156e1f54fe7cb7988bc26947ebef7d1933ba7b912077cc855ebb9d5da18aa5a8f92043c5cbab887212f9a5a9810e07eebfc23168454
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.ps1Filesize
3KB
MD5c800c44beca2cfa73dc8113cb84e90d4
SHA1aca79156fb80732bc556472574f04d40b3d4a0e2
SHA2564f72092255c228f5c03546a3c351baae4f3bb9d6eb8aeb0c709c74da6ec9f09d
SHA512e384d770f00c566d3246f0aa67b47033bad4713e0c5341e258b951e26bee4205ec9037732393b06b2966903f216dd0c55791c6d6c067a543c93de53cd126f466
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.vbsFilesize
2KB
MD56be2ca965d6ec7eed5fc2ca94c70be5d
SHA1127a21034790b8f07a4c6c95b64b0253011df068
SHA256a134febf91fe6fe748bfe937aefa809349f3c36a5791516d4cfc5bf7f2db9525
SHA512da9a71167f22f394f72fbf153571b75dbce4642331f5d59b2f6cb7e4f64a3faf7267b188760e74d27804b70f55d83f3e44ae77a6344d80039d59658571d83565
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1Filesize
245KB
MD59003c61627db62d6d2091d2b6383a630
SHA11b80514173761d3627d737b1e7dea52abb5c8761
SHA256864e1a7757e96375629837f696cbf6ac1d3db941949dbdbaa52538ee0d4010da
SHA512deb3db4961ec6d49a11ebc143a8d54c1c383dd27dd753638b766fd7877a27cd7c69de8bf8691b248f10f0bbee787f487fb1e6ff5fea5b3a0e3bdb6ddd16f3c33
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5fdacc790f1f30ad4fe7b7147bdaee510
SHA138ccd92de1bd43dca7f9e00786611600c5242e31
SHA2567da3ff38ab1aeb1b9776e511dd85766001491ecbe742eecea867abe2643c75f4
SHA51215f51a2e37c416068d226cbdedbaa3fe92094d7332e2050e41b6fc9fd44442efdb906f36f5b7fd062e66933a5e7578912c822993ffe281ef8fb823d5531b9744
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD575680edf91ef1c749ed80cd6f7d4f55c
SHA1b0fd0271a50231e1dae17fb196bb97edd25683a8
SHA25612c23de546333d757d9323dc3f19fc436b4018092bd05a7fd4d395c3bf6e940c
SHA5120fdfcaacf4e902b6925a12f1ae1f381110c8d3c575f80f0a470b22f4543a467b8a1e7b572ea2f7e748ceb9c47cf7b1a603a0f54949591d3d5b80d493dcadcaee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5fdacc790f1f30ad4fe7b7147bdaee510
SHA138ccd92de1bd43dca7f9e00786611600c5242e31
SHA2567da3ff38ab1aeb1b9776e511dd85766001491ecbe742eecea867abe2643c75f4
SHA51215f51a2e37c416068d226cbdedbaa3fe92094d7332e2050e41b6fc9fd44442efdb906f36f5b7fd062e66933a5e7578912c822993ffe281ef8fb823d5531b9744
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/436-69-0x0000000000000000-mapping.dmp
-
memory/872-84-0x0000000000000000-mapping.dmp
-
memory/956-83-0x0000000000000000-mapping.dmp
-
memory/960-85-0x0000000000000000-mapping.dmp
-
memory/980-86-0x0000000000000000-mapping.dmp
-
memory/980-90-0x000007FEF3D90000-0x000007FEF47B3000-memory.dmpFilesize
10.1MB
-
memory/980-94-0x0000000002784000-0x0000000002787000-memory.dmpFilesize
12KB
-
memory/980-92-0x0000000002784000-0x0000000002787000-memory.dmpFilesize
12KB
-
memory/980-95-0x000000000278B000-0x00000000027AA000-memory.dmpFilesize
124KB
-
memory/980-91-0x000007FEF3230000-0x000007FEF3D8D000-memory.dmpFilesize
11.4MB
-
memory/1280-71-0x000000000269B000-0x00000000026BA000-memory.dmpFilesize
124KB
-
memory/1280-67-0x0000000002694000-0x0000000002697000-memory.dmpFilesize
12KB
-
memory/1280-62-0x0000000000000000-mapping.dmp
-
memory/1280-72-0x0000000002694000-0x0000000002697000-memory.dmpFilesize
12KB
-
memory/1280-73-0x000000000269B000-0x00000000026BA000-memory.dmpFilesize
124KB
-
memory/1280-65-0x000007FEF33F0000-0x000007FEF3E13000-memory.dmpFilesize
10.1MB
-
memory/1280-66-0x000007FEF2890000-0x000007FEF33ED000-memory.dmpFilesize
11.4MB
-
memory/1380-80-0x0000000000000000-mapping.dmp
-
memory/1656-77-0x000007FEF3D90000-0x000007FEF47B3000-memory.dmpFilesize
10.1MB
-
memory/1656-82-0x00000000026FB000-0x000000000271A000-memory.dmpFilesize
124KB
-
memory/1656-81-0x00000000026F4000-0x00000000026F7000-memory.dmpFilesize
12KB
-
memory/1656-96-0x00000000026FB000-0x000000000271A000-memory.dmpFilesize
124KB
-
memory/1656-78-0x000007FEF3230000-0x000007FEF3D8D000-memory.dmpFilesize
11.4MB
-
memory/1736-74-0x000000000252B000-0x000000000254A000-memory.dmpFilesize
124KB
-
memory/1736-57-0x0000000002524000-0x0000000002527000-memory.dmpFilesize
12KB
-
memory/1736-56-0x000007FEF2890000-0x000007FEF33ED000-memory.dmpFilesize
11.4MB
-
memory/1736-54-0x000007FEFB741000-0x000007FEFB743000-memory.dmpFilesize
8KB
-
memory/1736-58-0x000000001B7B0000-0x000000001BAAF000-memory.dmpFilesize
3.0MB
-
memory/1736-55-0x000007FEF33F0000-0x000007FEF3E13000-memory.dmpFilesize
10.1MB
-
memory/1736-59-0x000000000252B000-0x000000000254A000-memory.dmpFilesize
124KB
-
memory/1736-60-0x0000000002524000-0x0000000002527000-memory.dmpFilesize
12KB
-
memory/1736-61-0x000000000252B000-0x000000000254A000-memory.dmpFilesize
124KB