Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 18:29
Static task
static1
Behavioral task
behavioral1
Sample
222.ps1
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
222.ps1
Resource
win10v2004-20230220-en
General
-
Target
222.ps1
-
Size
457KB
-
MD5
5ff1aded34d5d6f0635f6f9861436886
-
SHA1
d798ff38d279754353ee88ff35bf46a87dc75484
-
SHA256
abf2dcd61f4a9717e372e32dcfcb02831e51130f4a91fa87bb7954785db435fd
-
SHA512
b3d6b951c3130e8a834744cbebc78208b9e1393517ca40e4e3a5bdf391cb1c05c4a23ee88aaac61b1be5a163811069d97ecfdf372457607cc3716ea11a6d8402
-
SSDEEP
6144:6VDFV/A8nNKmbcRTUufYbE6N4tDeaBfLo1sHsl9yS/M0HixBNqrpB92bMDsA4nx2:snND98MDL
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2008 powershell.exe 2008 powershell.exe 672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 672 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1096 2008 powershell.exe 28 PID 2008 wrote to memory of 1096 2008 powershell.exe 28 PID 2008 wrote to memory of 1096 2008 powershell.exe 28 PID 1096 wrote to memory of 1900 1096 WScript.exe 29 PID 1096 wrote to memory of 1900 1096 WScript.exe 29 PID 1096 wrote to memory of 1900 1096 WScript.exe 29 PID 1900 wrote to memory of 672 1900 cmd.exe 31 PID 1900 wrote to memory of 672 1900 cmd.exe 31 PID 1900 wrote to memory of 672 1900 cmd.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\222.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Unlimited\ISO\Binnot.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\System32\cmd.execmd /c ""C:\ProgramData\Unlimited\ISO\Binnot.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Unlimited\ISO\Binnot.ps14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5f1d747a7825a5db756d428a5254d244e
SHA17db56fe57492bd856c787cd2a836eff4f2ce5e01
SHA2565863b76caee43b2f1efdd2322f2e5731b1537d1deeb35e860cd75a8304fe4ddf
SHA5124b1f63df96b8f9e2a381855974b2efab5bd48ae342b1e29a51661d0514ba6f8e62d23e3e58a9a9f978d39880ab03a9b9bf72ab52a546a965da20daa18c4d246d
-
Filesize
781B
MD558ef18971b1520648e0c6d67036251ff
SHA168bd1ee657ff233f6a1ee453914aaecdeb845284
SHA256226b14799e579e28954937fa3ffdb7d0e5dcd10360b35c329a7246a23be4b4b3
SHA5129b7f04aca4b3e2af5aafdc9ea30c1722722d668078bea8b0aaa2394d0cb50ac75716fb9173d4084bd5a9cfaa279bd94404b64c140532daa5b3bdd66842f332d2
-
Filesize
204B
MD58444901b66d6f83f3a684f1b44646868
SHA169c9c40aef3734959b4ce5f07005bf13c07646f9
SHA256cfeaafc87ceec9986f37f6a42ecfa39260f98c951404df95da5e074141add5da
SHA5127493b0d40c9c914c8968b42752b1d14d415e7bccff07f9bf2ab976d77517e12a456f142ee786527c4e536fab3e4156b21ce353f51f5925bbc405937ad7929bbb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5340e1993eb40b8bed81349fab46f89c5
SHA113acc43c5621e815bf6c8371f360b9fa29625fdc
SHA2567caa47d4b27f7a6b91453329a3471a0b06ff6f7c67fc060aa15ff98385e6e46c
SHA512abc68892589462b10615969593c6f92be3f6d6afda4683314ced7c1b083f039e8b6986692e1eb320b4f982041334a6c34f6b84502cb171c917478fb37b9093d9