Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 07:58
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20220812-en
General
-
Target
a.exe
-
Size
1.4MB
-
MD5
8a627782b855f06a3d6d273d11f04f46
-
SHA1
30570c697533fc3fc7a19ad5d4bc3753f2cf1c0b
-
SHA256
f0b7a0368fc27d98d42efd4e9c9dd2c252e5fcaaf13ffd67b3c545ec5b1c53e9
-
SHA512
211fed71bcb75201380921a7de7bf8b88c451a5125f751be616a1775ad3c6a1d59ecc77aa997b053583c1a7d6419e4cfa8ff9bc99d50d1440bf34943d2c1a578
-
SSDEEP
24576:xirh2DKsuoIj4G6KFined4e5+MRicaRT4D2aKpq9ZEjrTnFOyzhyz:Ir0DfFpG6S68+KaRTWNKpEEfTnF
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
Processes:
powershell.exeflow pid process 16 2664 powershell.exe 32 2664 powershell.exe 39 2664 powershell.exe 40 2664 powershell.exe 50 2664 powershell.exe 53 2664 powershell.exe 54 2664 powershell.exe 55 2664 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2664 powershell.exe 2664 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 2664 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
a.exedescription pid process target process PID 2288 wrote to memory of 2664 2288 a.exe powershell.exe PID 2288 wrote to memory of 2664 2288 a.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -F C:\ProgramData\test.ps12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\test.ps1Filesize
310KB
MD5220e9238b05cb802d63f7d79d11b2a32
SHA177324ddee92b5ee1c2d50680ea15dd6e28ef402b
SHA256248d8893d926c765d168bd48211650094dbcf8a8988c448f3b271c41bec8ca9d
SHA512748f9149ceaa46789938d66a87dad5c92a9beea65a7c84c07fa42378fdee70b1340d777fcfc78efcd85254660fd4a858fe10bd83464564cde7b12c01ebbcdb7a
-
memory/2664-132-0x0000000000000000-mapping.dmp
-
memory/2664-133-0x000001A5FCD50000-0x000001A5FCD72000-memory.dmpFilesize
136KB
-
memory/2664-135-0x00007FFFEE480000-0x00007FFFEEF41000-memory.dmpFilesize
10.8MB
-
memory/2664-136-0x000001A5FD6A0000-0x000001A5FD6B5000-memory.dmpFilesize
84KB
-
memory/2664-137-0x000001A5FD30A000-0x000001A5FD30F000-memory.dmpFilesize
20KB
-
memory/2664-138-0x00007FFFEE480000-0x00007FFFEEF41000-memory.dmpFilesize
10.8MB