Analysis
-
max time kernel
19s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 23:32
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
fix/glimpsed.ps1
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
fix/glimpsed.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
fix/nifty.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
fix/nifty.js
Resource
win10v2004-20220812-en
General
-
Target
fix/glimpsed.ps1
-
Size
376B
-
MD5
79622867fd00d2ba17146086bfb1c26d
-
SHA1
5b65ea5a3200eb810adbad875bee2b7ac4ba90e8
-
SHA256
6d4127d7e7ef68ec872c0789b7c018bace75628f3fb848b6f41d072074446483
-
SHA512
fcc2199851ef8c5efa392729dd24654c58d0db3fba7d2921d668cd9a454acd336c6e3d5c3e8dbd94aed837e02daf667cf822c289815fcf18db93de9e4978fed5
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 628 powershell.exe 628 powershell.exe 628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 628 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 628 wrote to memory of 564 628 powershell.exe rundll32.exe PID 628 wrote to memory of 564 628 powershell.exe rundll32.exe PID 628 wrote to memory of 564 628 powershell.exe rundll32.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fix\glimpsed.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\eclipsedDismisses.jpg DrawThemeIcon2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/564-60-0x0000000000000000-mapping.dmp
-
memory/628-54-0x000007FEFBA41000-0x000007FEFBA43000-memory.dmpFilesize
8KB
-
memory/628-55-0x000007FEF3CD0000-0x000007FEF46F3000-memory.dmpFilesize
10.1MB
-
memory/628-57-0x0000000002714000-0x0000000002717000-memory.dmpFilesize
12KB
-
memory/628-56-0x000007FEF3170000-0x000007FEF3CCD000-memory.dmpFilesize
11.4MB
-
memory/628-58-0x000000001B820000-0x000000001BB1F000-memory.dmpFilesize
3.0MB
-
memory/628-59-0x000000000271B000-0x000000000273A000-memory.dmpFilesize
124KB
-
memory/628-61-0x0000000002714000-0x0000000002717000-memory.dmpFilesize
12KB
-
memory/628-62-0x000000000271B000-0x000000000273A000-memory.dmpFilesize
124KB