Overview
overview
10Static
static
AH-703.iso
windows7-x64
3AH-703.iso
windows10-2004-x64
3AS.js
windows7-x64
10AS.js
windows10-2004-x64
10fix/adjutant.js
windows7-x64
3fix/adjutant.js
windows10-2004-x64
7fix/data.txt
windows7-x64
1fix/data.txt
windows10-2004-x64
1fix/hypers...ss.ps1
windows7-x64
1fix/hypers...ss.ps1
windows10-2004-x64
1Resubmissions
28-11-2022 19:10
221128-xvd6ashh56 1028-11-2022 19:09
221128-xtsmashh23 1028-11-2022 15:04
221128-sf2wlacc29 10Analysis
-
max time kernel
605s -
max time network
635s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 19:10
Static task
static1
Behavioral task
behavioral1
Sample
AH-703.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AH-703.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
AS.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
fix/adjutant.js
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/adjutant.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
fix/data.txt
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
fix/data.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
fix/hypersensitiveness.ps1
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
fix/hypersensitiveness.ps1
Resource
win10v2004-20221111-en
General
-
Target
fix/hypersensitiveness.ps1
-
Size
372B
-
MD5
66372a25352922e2fccd70bd7de22212
-
SHA1
ab25a17b152e3eddf61e3e076194fa40ebafa972
-
SHA256
072e68632cfb5a6db5f51cb84896b8f96827b18d81bedb858818e7d1ba46011f
-
SHA512
0ce33acb0b2aa55b8514623ebd3c72707544507a68ffa75e414f5287aceb76b334cf08aafe2bcfba359ccda9e1cfc4acd760eaec4c3adf759575bee7f75687f2
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 820 powershell.exe 820 powershell.exe 820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 820 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 820 wrote to memory of 676 820 powershell.exe rundll32.exe PID 820 wrote to memory of 676 820 powershell.exe rundll32.exe PID 820 wrote to memory of 676 820 powershell.exe rundll32.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fix\hypersensitiveness.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\pickedKnelled.jpg DrawThemeIcon2⤵PID:676
-