Resubmissions
28-11-2022 19:10
221128-xvd6ashh56 1028-11-2022 19:09
221128-xtsmashh23 1028-11-2022 15:04
221128-sf2wlacc29 10Analysis
-
max time kernel
204s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 15:04
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
fix/adjutant.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
fix/adjutant.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
fix/hypersensitiveness.ps1
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/hypersensitiveness.ps1
Resource
win10v2004-20221111-en
General
-
Target
fix/hypersensitiveness.ps1
-
Size
372B
-
MD5
66372a25352922e2fccd70bd7de22212
-
SHA1
ab25a17b152e3eddf61e3e076194fa40ebafa972
-
SHA256
072e68632cfb5a6db5f51cb84896b8f96827b18d81bedb858818e7d1ba46011f
-
SHA512
0ce33acb0b2aa55b8514623ebd3c72707544507a68ffa75e414f5287aceb76b334cf08aafe2bcfba359ccda9e1cfc4acd760eaec4c3adf759575bee7f75687f2
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 1060 powershell.exe 1060 powershell.exe 1060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1060 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 1060 wrote to memory of 1288 1060 powershell.exe rundll32.exe PID 1060 wrote to memory of 1288 1060 powershell.exe rundll32.exe PID 1060 wrote to memory of 1288 1060 powershell.exe rundll32.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fix\hypersensitiveness.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\pickedKnelled.jpg DrawThemeIcon2⤵PID:1288
-