Analysis

  • max time kernel
    30s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 17:11

General

  • Target

    english.ps1

  • Size

    2.2MB

  • MD5

    e560c98fa5542185d5fc2f48d96b46f9

  • SHA1

    539e5e720a8e9e3e7ced26b706c63a38496be1af

  • SHA256

    3cb26bbe24bf7d7f3e224efea1d244ed89b7305ad45a5804a26405ddc4ced73c

  • SHA512

    d63482073541a5be2217f6b91c5f773a7aa40e9bcd7deaf7953909e2819d478c987b3a5aa77d36b62408a76d267b4118a2eb6e9e711ba8a82692842c0ac796bc

  • SSDEEP

    24576:itr8i7vgeGn0iwEhOSmH/wBC9aU+NFfz4hG9Kq8UHKpvFXErBc1IuQw:C7vhtiwmOUdshGVvWw6

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\english.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vwhd4ers.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4433.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4423.tmp"
        3⤵
          PID:852

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES4433.tmp

      Filesize

      1KB

      MD5

      8426cfd2479e1ed3326c8f672a3e9390

      SHA1

      3aa7ff0a84737b61d010811c8dab741f709b313d

      SHA256

      e9efde170260acacb67999f287f091bfeb1d47abcd1fef389daa2ae7d1a52999

      SHA512

      aa56f7844441fc62c9689e4680abccd426b1a06475bfc24b0a265a4290ddaabe3befb1c5bfba2fd2fba2b5882a733499d6611bc462f9552a5ffcb784bf9d2bf6

    • C:\Users\Admin\AppData\Local\Temp\vwhd4ers.dll

      Filesize

      3KB

      MD5

      ff9e80123c4b23f4233c0d756be1e5ea

      SHA1

      9544a7cca6acd0c075a6d4442f527d695b5de81f

      SHA256

      cf0f9336f20e61ef993a8b5dcea174f26f868556a6260f6a2a4940baaf39d7ed

      SHA512

      f55ad3b85f3ea755b98872b1144f79432448ee9fa2578eddc79645445a18ae9fa78da927bad0670dc2b932d13ef8c943bcb679cd5b6eae7e94cf90999601affc

    • C:\Users\Admin\AppData\Local\Temp\vwhd4ers.pdb

      Filesize

      7KB

      MD5

      e5dc4c4be2fbf8881fbd72e68a07fe14

      SHA1

      da33fa1b92534d92ea41b684c5023739c43ebc36

      SHA256

      ea12553558211690a92c232aa4ac01fd3fcc85f11c7d7024f3f6cc7851c30260

      SHA512

      6b169a2d3c636c2c75b109cce8e8f30984a032ccfd0bd43ebb8cfd56352355c1ff31a028dfa7f8f11a76e2d66dd6699793060e916476a832238d453f6e2f9133

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC4423.tmp

      Filesize

      652B

      MD5

      830e45c41b076f0ab9cb916d7e019c0a

      SHA1

      5c4594226faadd6b6269303416c7ed30d1e04478

      SHA256

      9766ad7aca394d30e0e3b138cfcdfc20df3b0832116a3dec348a2c9580e5b8ad

      SHA512

      26fd04a88ce343351efc2446ddea966e0527cfcef44546373e6cdd2c4ac33d1c21662c4069fb3ba49cf0964b7807b8cffbf16880f9ce2bddcaa44e12dfce4673

    • \??\c:\Users\Admin\AppData\Local\Temp\vwhd4ers.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\vwhd4ers.cmdline

      Filesize

      309B

      MD5

      475348da60a937de3597fedb719260ac

      SHA1

      cae2af40f574ecfbe7e2937b846613c0627a5f02

      SHA256

      8845d3daf9002037aedd2977d5b56f47e8e99795c47f1417a192331d8a04fa8c

      SHA512

      b8494f49ee8968657e7d122bf9af2c4967c665e7d647e46ff26e91f9a67487381b41ab0b007e535583245406b65e3b03af9343d18a3e776622ecf9689890d7be

    • memory/1504-58-0x0000000002800000-0x0000000002880000-memory.dmp

      Filesize

      512KB

    • memory/1504-59-0x0000000002800000-0x0000000002880000-memory.dmp

      Filesize

      512KB

    • memory/1504-60-0x000000001B2B0000-0x000000001B592000-memory.dmp

      Filesize

      2.9MB

    • memory/1504-61-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

      Filesize

      32KB

    • memory/1504-67-0x0000000002800000-0x0000000002880000-memory.dmp

      Filesize

      512KB

    • memory/1504-76-0x0000000002750000-0x0000000002758000-memory.dmp

      Filesize

      32KB