Analysis
-
max time kernel
217s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
install.ps1
Resource
win7-20220901-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
install.ps1
Resource
win10v2004-20221111-en
7 signatures
150 seconds
General
-
Target
install.ps1
-
Size
668B
-
MD5
2fbf1f1237da3db5944c0a4833859248
-
SHA1
471d68ca41fd773b2511311f46cd3014b8a4bdf4
-
SHA256
263942724d526809d341cc855e2d4cd0277c34f67acaede643af569dbaa9f766
-
SHA512
27c4f665dc1c76105dc5ae0146c78b0fd127a2ff78accad8a095042803b8782398ada081b823e9ceaefd1d50fbea1dce2b5102d8ac89e53428c74f3291bcc104
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 32 240 powershell.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2956 attrib.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe 700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 240 powershell.exe 240 powershell.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeSecurityPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeSecurityPrivilege 240 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 240 wrote to memory of 2916 240 powershell.exe 86 PID 240 wrote to memory of 2916 240 powershell.exe 86 PID 240 wrote to memory of 700 240 powershell.exe 87 PID 240 wrote to memory of 700 240 powershell.exe 87 PID 240 wrote to memory of 2956 240 powershell.exe 88 PID 240 wrote to memory of 2956 240 powershell.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2956 attrib.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\install.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /XML C:\ProgramCache\xmrig\CacheUpdater.xml /tn CacheUpdater2⤵
- Creates scheduled task(s)
PID:2916
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /XML C:\ProgramCache\xmrig\CacheUpdaterCancel.xml /tn CacheUpdaterCancel2⤵
- Creates scheduled task(s)
PID:700
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +s +h c:\ProgramCache2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2956
-