Analysis

  • max time kernel
    217s
  • max time network
    235s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 08:32

General

  • Target

    install.ps1

  • Size

    668B

  • MD5

    2fbf1f1237da3db5944c0a4833859248

  • SHA1

    471d68ca41fd773b2511311f46cd3014b8a4bdf4

  • SHA256

    263942724d526809d341cc855e2d4cd0277c34f67acaede643af569dbaa9f766

  • SHA512

    27c4f665dc1c76105dc5ae0146c78b0fd127a2ff78accad8a095042803b8782398ada081b823e9ceaefd1d50fbea1dce2b5102d8ac89e53428c74f3291bcc104

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\install.ps1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Windows\system32\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /Create /XML C:\ProgramCache\xmrig\CacheUpdater.xml /tn CacheUpdater
      2⤵
      • Creates scheduled task(s)
      PID:2916
    • C:\Windows\system32\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /Create /XML C:\ProgramCache\xmrig\CacheUpdaterCancel.xml /tn CacheUpdaterCancel
      2⤵
      • Creates scheduled task(s)
      PID:700
    • C:\Windows\system32\attrib.exe
      "C:\Windows\system32\attrib.exe" +s +h c:\ProgramCache
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:2956

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/240-132-0x0000026EC9D80000-0x0000026EC9DA2000-memory.dmp

          Filesize

          136KB

        • memory/240-133-0x00007FFF684A0000-0x00007FFF68F61000-memory.dmp

          Filesize

          10.8MB

        • memory/240-134-0x00007FFF684A0000-0x00007FFF68F61000-memory.dmp

          Filesize

          10.8MB