Analysis
-
max time kernel
44s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 11:05
Static task
static1
Behavioral task
behavioral1
Sample
WP.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
WP.vbs
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
metaphysic/clumped.ps1
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
metaphysic/clumped.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
metaphysic/goodly.vbs
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
metaphysic/goodly.vbs
Resource
win10v2004-20221111-en
General
-
Target
metaphysic/clumped.ps1
-
Size
370B
-
MD5
5c6752386f0d0998e473c07477426a5e
-
SHA1
f12c4cd2257af6b248571bf390784ada9cca3e4b
-
SHA256
9b626bf28a18833d5a1d9a67a8e884111838574d7e69d2688de3a11fcd514079
-
SHA512
d372a20e56dbe572b2893a4c480f7ef2218c2462b4b9bcda8d157eaa76464b4deebe2c1b46d1026fc8e2587b947074246752b4e383143ad7d125284d92b4bc25
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1724 powershell.exe 1724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1724 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 1724 wrote to memory of 1100 1724 powershell.exe rundll32.exe PID 1724 wrote to memory of 1100 1724 powershell.exe rundll32.exe PID 1724 wrote to memory of 1100 1724 powershell.exe rundll32.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\metaphysic\clumped.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\spikingUnintelligible.txt DrawThemeIcon2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1100-58-0x0000000000000000-mapping.dmp
-
memory/1724-54-0x000007FEFB771000-0x000007FEFB773000-memory.dmpFilesize
8KB
-
memory/1724-55-0x000007FEF3D90000-0x000007FEF47B3000-memory.dmpFilesize
10.1MB
-
memory/1724-56-0x000007FEF3230000-0x000007FEF3D8D000-memory.dmpFilesize
11.4MB
-
memory/1724-57-0x0000000002514000-0x0000000002517000-memory.dmpFilesize
12KB
-
memory/1724-60-0x000000000251B000-0x000000000253A000-memory.dmpFilesize
124KB
-
memory/1724-59-0x0000000002514000-0x0000000002517000-memory.dmpFilesize
12KB