Resubmissions

21-04-2023 18:11

230421-wslxpahc47 3

21-04-2023 17:23

230421-vylnfaha68 3

21-04-2023 17:21

230421-vxcddaha62 1

Analysis

  • max time kernel
    159s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2023 17:21

General

  • Target

    ACMobile.UWP_3.13.9.0_Test/Install.ps1

  • Size

    13KB

  • MD5

    dd937d9ed27f42ff0ed121c977702a9f

  • SHA1

    b48dbaac31d8dee5b4224f758c374f7c6df35b68

  • SHA256

    dc07e5b80c0df8263719a7d5fe3d6352cab8cfd19aac9b046c2d760ba1306fca

  • SHA512

    a899eb44ef82315c6abb7d9cd98ffd1c3eb981b17d491e44c4873e3334971b9d0b7c0251b7ea843c952229263db36cb764bbc707c805f550d91fc4f4477cce38

  • SSDEEP

    384:XYdB0dtRynIcRsG5B3u0pv7s8yto9lPbFKYbIagfeiiTBRJfYQHm:XYdB0dtRKIosiBDTs3a9lPEYMaCePtRS

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ACMobile.UWP_3.13.9.0_Test\Install.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
      2⤵
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Windows\SYSTEM32\getmac.exe
        "getmac"
        3⤵
          PID:1956
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\spdc1pdz\spdc1pdz.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1316
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7664.tmp" "c:\Users\Admin\AppData\Local\Temp\spdc1pdz\CSCC07D920B911948AF9BD99CCEC93F92E2.TMP"
          3⤵
            PID:2176
        • C:\Windows\system32\certutil.exe
          "C:\Windows\system32\certutil.exe" -verify C:\Users\Admin\AppData\Local\Temp\ACMobile.UWP_3.13.9.0_Test\ACMobile.UWP_3.13.9.0_x86.cer
          2⤵
            PID:4484
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Unrestricted -file "C:\Users\Admin\AppData\Local\Temp\ACMobile.UWP_3.13.9.0_Test\Add-AppDevPackage.ps1" -GetDeveloperLicense -CertificatePath "C:\Users\Admin\AppData\Local\Temp\ACMobile.UWP_3.13.9.0_Test\ACMobile.UWP_3.13.9.0_x86.cer"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2256

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

          Filesize

          53KB

          MD5

          93678e82d776686aa54c42b8a98e6cbc

          SHA1

          802939dfed99ac74814c4371388b204c5810241d

          SHA256

          da32a79a8e04cbafb1c5980b3d6225f4705010df5eb45d464cd5bf6b642d7841

          SHA512

          0b412a1e11c0639d72f6a58c661ecc43da021c010c4d1e66051c5a376ebab287480bbf663345c9bd2a79ec3a35a9788cf04d74d612449f76fe2c87576cd13520

        • C:\Users\Admin\AppData\Local\Temp\APPX.gtfuvczrx5d1m2llcioo2kmkg.tmp

          Filesize

          1KB

          MD5

          1e3e9426b2b7090d86c9173101be7777

          SHA1

          f4c6df39277e060ddf96e8431499e880a4007ca6

          SHA256

          626e415589b459bb1e4f44452298be280a243a92cfdd5077acb142630b653583

          SHA512

          ccf2a3922d35dabd196988612954d650ea70660c79418355275bed149588b1bc25e43d3a05f0693d31b3bc3387c666428fa65e625ad56010feeeb9f1a5de9c5e

        • C:\Users\Admin\AppData\Local\Temp\APPX.ia8fjbk76h07za4w3ciazuipf.tmp

          Filesize

          338B

          MD5

          98dc0abbca5be2f9ce9e1816a8d526af

          SHA1

          b96230531a9ab54b52ecd34f2f9dad9be47ab0be

          SHA256

          630e77651ff6164d5fd984b4646da223027dcb42c002b3f1ea95173f3dead8cb

          SHA512

          7f979b21db1bd84d9709bd48d49a80ae6f7bc8315d660874e573bdbdfe66a0517a96a9135a25749545e4dd4a7c518d34a28d4cd719e4730797f7c6a8bcc472df

        • C:\Users\Admin\AppData\Local\Temp\APPX.xs87u7h82qzhq3g8cqpyx3hwd.tmp

          Filesize

          1KB

          MD5

          ff363a8643bf14f5880c92ebabe873bf

          SHA1

          5900c9eadb831d0555ea26a77d988e60be49fd51

          SHA256

          4ab1dbae2e034cae492e3345d619d5b86e99db02b9b251b19f6f0f5f1dc54f7d

          SHA512

          906db6e23b159832d30d278c92b78fdb16df9d85a42fa6ffb14a7f059c7dfc13f83119013f44f8bcbff6027f2a40903bacc0ca5d6fa8b5b2864328bfefa75e04

        • C:\Users\Admin\AppData\Local\Temp\RES7664.tmp

          Filesize

          1KB

          MD5

          35c8ffeb1cb951bd2d3ad23468e6edbe

          SHA1

          26d26491750c54e25b4ce793d0ec345be071f6a9

          SHA256

          066b7aee4b396b7fad1a92cc40b8b884588d55779fae5728e24b7df06e99067d

          SHA512

          95c9740becd00d60ed6c615ae92bb079067bb065ce578119045ffc0a956d69a92a55b1d42626312d1d804206a448ec86905bca3fba6b42907b2d746b1ddd819b

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hpur12lr.lkp.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\spdc1pdz\spdc1pdz.dll

          Filesize

          3KB

          MD5

          488088a320bcdc96ef271871a4cdfb29

          SHA1

          cd3ca17c10b0df006a3526c45e99d2b1d950255b

          SHA256

          acf0ed935eef8742dcb474f6415037a5c6f71f6e2d8a06055a5efbafc997c889

          SHA512

          432a13139513bb0732ca5dd8fef5149d32eaca61fe5214b3edb26b5af527e1e167f7f22a793ee673f26dddb8b07327e1e31cb5b781f32123192c60af7835e113

        • \??\c:\Users\Admin\AppData\Local\Temp\spdc1pdz\CSCC07D920B911948AF9BD99CCEC93F92E2.TMP

          Filesize

          652B

          MD5

          2d56985c5975e333416313dd946a1859

          SHA1

          03f380a01324ad4fe529679b2a1d2d146b62d1fc

          SHA256

          400177aa50fe1f0e513200ccfd5f29bb8856c49d7b956f6276c3afcf6c3eaa30

          SHA512

          7d3639796bdcb909ba69a178e67162f9da37449af2cf6774bc127d46d2fde56d82dbc1a4186e64f85961a7e610fee78a01c4782bc3a632e311a494fca990920f

        • \??\c:\Users\Admin\AppData\Local\Temp\spdc1pdz\spdc1pdz.0.cs

          Filesize

          282B

          MD5

          d625120d410db8487a294c43f3d1ee46

          SHA1

          0291aa75bb962ef6876e89d3775af4620b287169

          SHA256

          b935ab97b4b4f12b796c4cf506bb5df3b2686e327b88a8f9032dd2e641968624

          SHA512

          a4b62ec56858a374986e9d97621f1117d34419652c36f901533fb5835971fe153497e7ec2dc8dd8a5a0b1e26c7461fa03cd55aedec4ee439b91c197f05178921

        • \??\c:\Users\Admin\AppData\Local\Temp\spdc1pdz\spdc1pdz.cmdline

          Filesize

          369B

          MD5

          7219ed0e502a95562ae88cbc681bb20b

          SHA1

          a2a818f59a0c992539a26e5e76b1f175939af03a

          SHA256

          0e916815363a01fa3cc5a4aee9acfd5cb2a938d81d7372a79411a415692afaad

          SHA512

          f1250c060fa5a0c8c60e42eb6e091f74473bbd6e2c0f75f9c773725520bb14cea6f06c4898860f3af2cd964b8cf2859a01ec311189919aabe43964df60ec5ece

        • memory/2256-225-0x000001F0D6820000-0x000001F0D6830000-memory.dmp

          Filesize

          64KB

        • memory/2256-226-0x000001F0D6820000-0x000001F0D6830000-memory.dmp

          Filesize

          64KB

        • memory/2256-236-0x000001F0D6820000-0x000001F0D6830000-memory.dmp

          Filesize

          64KB

        • memory/2460-149-0x000002437FA20000-0x000002437FB96000-memory.dmp

          Filesize

          1.5MB

        • memory/2460-150-0x000002437FDB0000-0x000002437FFBA000-memory.dmp

          Filesize

          2.0MB

        • memory/2460-134-0x0000024301720000-0x0000024301730000-memory.dmp

          Filesize

          64KB

        • memory/2460-144-0x000002437F7E0000-0x000002437F802000-memory.dmp

          Filesize

          136KB

        • memory/2460-145-0x0000024301720000-0x0000024301730000-memory.dmp

          Filesize

          64KB

        • memory/2460-146-0x0000024301720000-0x0000024301730000-memory.dmp

          Filesize

          64KB

        • memory/2460-222-0x000002437F7B0000-0x000002437F7BA000-memory.dmp

          Filesize

          40KB

        • memory/2460-147-0x0000024301720000-0x0000024301730000-memory.dmp

          Filesize

          64KB

        • memory/2460-148-0x0000024301720000-0x0000024301730000-memory.dmp

          Filesize

          64KB

        • memory/2460-133-0x0000024301720000-0x0000024301730000-memory.dmp

          Filesize

          64KB

        • memory/3176-169-0x00000220E81F0000-0x00000220E81FC000-memory.dmp

          Filesize

          48KB

        • memory/3176-160-0x00000220CE170000-0x00000220CE180000-memory.dmp

          Filesize

          64KB

        • memory/3176-161-0x00000220CE170000-0x00000220CE180000-memory.dmp

          Filesize

          64KB

        • memory/3176-162-0x00000220CE170000-0x00000220CE180000-memory.dmp

          Filesize

          64KB

        • memory/3176-163-0x00000220CE170000-0x00000220CE180000-memory.dmp

          Filesize

          64KB

        • memory/3176-170-0x00000220E83A0000-0x00000220E8426000-memory.dmp

          Filesize

          536KB

        • memory/3176-164-0x00000220CE170000-0x00000220CE180000-memory.dmp

          Filesize

          64KB

        • memory/3176-168-0x00000220E82C0000-0x00000220E839A000-memory.dmp

          Filesize

          872KB

        • memory/3176-167-0x00000220E81D0000-0x00000220E81DE000-memory.dmp

          Filesize

          56KB

        • memory/3176-165-0x00000220CE170000-0x00000220CE180000-memory.dmp

          Filesize

          64KB