Resubmissions

21/04/2023, 18:11

230421-wslxpahc47 3

21/04/2023, 17:23

230421-vylnfaha68 3

21/04/2023, 17:21

230421-vxcddaha62 1

Analysis

  • max time kernel
    29s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2023, 18:11

General

  • Target

    ACMobile.UWP_3.13.9.0_Test/Add-AppDevPackage.ps1

  • Size

    36KB

  • MD5

    d4314b32d1a7d3622c083da53e7b62fb

  • SHA1

    7495dbaaf794fd896560969681cb247dff2194ef

  • SHA256

    afa90d0699ad7ee3644b74903fdfe8d3efcef216710d77594ab98a74fe1f55b9

  • SHA512

    c64acf9a1ae326a396752365dc38e4ce255320da2a2fcdd7fc12d79a8e6e0f1147330b84c3398015e73e95fe8324622cbacb544cbb4f5b07f5a65d8b7916733a

  • SSDEEP

    768:9qm7sDio+bTVYIBCesTW1jB0dtRKIosiBDTp329SGMacePtRJfB78r:deI1sTZRfi1d329SL0FZY

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ACMobile.UWP_3.13.9.0_Test\Add-AppDevPackage.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\grv1dnyj.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES122B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC121B.tmp"
        3⤵
          PID:524

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RES122B.tmp

            Filesize

            1KB

            MD5

            cca55984bf6bcb552bcb8c9a8b3f828d

            SHA1

            b2e71f944bf81bdd19ffc04f2629fd0da235efb3

            SHA256

            d9fe4aec58886662ed75ad71e0f4b8f2166cbd60b8134e6b997ea5949affeaa7

            SHA512

            e2b3f8b9dbb63ed7cecbc19cd0296f8f6e45834f6666f5a290611f7fe18dc2e80696be34a3f6055917cbf028c043f446a69b3ba351f472ac82045a83671df6e3

          • C:\Users\Admin\AppData\Local\Temp\grv1dnyj.dll

            Filesize

            3KB

            MD5

            615801a9c8dc8158e3ef7ba5593a86af

            SHA1

            aa4a54a545414c5f78bd170c121cc717cf6f2846

            SHA256

            9afbe8c34208c532cee9b0426cefe6d7b6e27753005dfb116601e9620a7d5640

            SHA512

            323c9d117b8978e6f37a4cf27f3b37e4e15b347e686213da4bfd605f379c44aae3a5a9ae2a2b8aa1f2bb926225725074cd828c9558d0b7ab555dd6a0e8766997

          • C:\Users\Admin\AppData\Local\Temp\grv1dnyj.pdb

            Filesize

            7KB

            MD5

            a2d1aeeea0a422f8266acf24978a3cec

            SHA1

            564ee5668af2acfa2544f23fe3db46bbe80257cd

            SHA256

            99cd844865e7d9f5c803c518ae99e968f889653af41d22554ac86bb731fe0852

            SHA512

            76179cfa1a4028d8ff3c403f26644505ecc6ffc1298af45c32a3243816382036b7621919bcbef86f5de32c2bfc447b6373732e0fc3f4d5cd92dacc21cb1ed757

          • \??\c:\Users\Admin\AppData\Local\Temp\CSC121B.tmp

            Filesize

            652B

            MD5

            15efec1fff5a8042639137b49aa7159b

            SHA1

            84ef96947b9037934a6fb640d234c959930b564d

            SHA256

            311c56ee47af0afa2a98d591cd5aad29f7eff34fc95390e440a9585b6ab6633d

            SHA512

            2c42eb6851b9ae59e1ec9435ac066f5cdc569d729aefa79da4542ebf82983c05c4406860eaf9180a64c3c56af06622b67c18e176ad969bef2ebdf21beee5dcd3

          • \??\c:\Users\Admin\AppData\Local\Temp\grv1dnyj.0.cs

            Filesize

            282B

            MD5

            d625120d410db8487a294c43f3d1ee46

            SHA1

            0291aa75bb962ef6876e89d3775af4620b287169

            SHA256

            b935ab97b4b4f12b796c4cf506bb5df3b2686e327b88a8f9032dd2e641968624

            SHA512

            a4b62ec56858a374986e9d97621f1117d34419652c36f901533fb5835971fe153497e7ec2dc8dd8a5a0b1e26c7461fa03cd55aedec4ee439b91c197f05178921

          • \??\c:\Users\Admin\AppData\Local\Temp\grv1dnyj.cmdline

            Filesize

            309B

            MD5

            05536ec73bfee7395ad843907d2211b6

            SHA1

            c720fbc97f0f594f83b5a706b617ba0a96476952

            SHA256

            b307098914d37f2afbfa7d91bc48c2cbfb6fb1b93d4603029f316c85af7fef6f

            SHA512

            7854efcb58ac9a34f0650a0b269abc00c008be2eba942d88164194bd6270634eea5a6094edeb8b498fb5d804ff7dd480ac476e67aa90f7d06b2da7f7458ffc21

          • memory/1700-58-0x000000001B3A0000-0x000000001B682000-memory.dmp

            Filesize

            2.9MB

          • memory/1700-62-0x0000000002570000-0x00000000025F0000-memory.dmp

            Filesize

            512KB

          • memory/1700-61-0x0000000002570000-0x00000000025F0000-memory.dmp

            Filesize

            512KB

          • memory/1700-60-0x0000000002570000-0x00000000025F0000-memory.dmp

            Filesize

            512KB

          • memory/1700-76-0x0000000002460000-0x0000000002468000-memory.dmp

            Filesize

            32KB

          • memory/1700-59-0x0000000001F90000-0x0000000001F98000-memory.dmp

            Filesize

            32KB

          • memory/1700-79-0x000000000257B000-0x00000000025B2000-memory.dmp

            Filesize

            220KB