Analysis
-
max time kernel
47s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
fix/resetting.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
fix/resetting.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
fix/scaly.ps1
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/scaly.ps1
Resource
win10v2004-20221111-en
General
-
Target
fix/scaly.ps1
-
Size
375B
-
MD5
a3fde8e47ad557b120a7e89e46513d9b
-
SHA1
d222886e0e33b03b8ae84ccc4e9b33549bbde80f
-
SHA256
a895f778c2119af6eb5c8b209d63637db2cd80a40848c773fdb413683f96e9e8
-
SHA512
3be76c1f1bff8e9e0b6b029c4e0f515df7db7f494635f9706b173e867112fb94df11d27d790d84772533e70d7384fa30fbef57a7f1da2b1fe6d1a8008951ac36
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 576 powershell.exe 576 powershell.exe 576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 576 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 576 wrote to memory of 1424 576 powershell.exe rundll32.exe PID 576 wrote to memory of 1424 576 powershell.exe rundll32.exe PID 576 wrote to memory of 1424 576 powershell.exe rundll32.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fix\scaly.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\inducteesRaveled.jpg DrawThemeIcon2⤵PID:1424
-