Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/05/2023, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
fa9fe798ce4705a1ccbb22f8cb813c84e4abce585413eb7e26f0934443e75dbd.ps1
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fa9fe798ce4705a1ccbb22f8cb813c84e4abce585413eb7e26f0934443e75dbd.ps1
Resource
win10v2004-20230220-en
General
-
Target
fa9fe798ce4705a1ccbb22f8cb813c84e4abce585413eb7e26f0934443e75dbd.ps1
-
Size
689KB
-
MD5
e26e685d51988b2ae00c8e7a4ef256db
-
SHA1
ba09428d9fdaadcd92a578d12a48dcb61d331856
-
SHA256
fa9fe798ce4705a1ccbb22f8cb813c84e4abce585413eb7e26f0934443e75dbd
-
SHA512
dc362252519f2637577e4b6fa3bc7df69cfa937fe9eaa78d078bfd24d4ea5b887f90319d1ae918b10c3ec081bcb35a7d436a173cae712d4d6e2f4f8f8af65eef
-
SSDEEP
1536:or/BsVwGJ9iOowdWIa/aEgRJWb+pifHNutiQ3JlqmbNNnLRS2EFurYdq7PbAeVh/:N
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 704 1568 POWERSHELL.exe 31 -
Registers COM server for autorun 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POWERSHELL.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1696 reg.exe 1688 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1316 powershell.exe 1512 powershell.exe 704 POWERSHELL.exe 288 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1316 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 704 POWERSHELL.exe Token: SeDebugPrivilege 288 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1512 1316 powershell.exe 29 PID 1316 wrote to memory of 1512 1316 powershell.exe 29 PID 1316 wrote to memory of 1512 1316 powershell.exe 29 PID 1512 wrote to memory of 1112 1512 powershell.exe 30 PID 1512 wrote to memory of 1112 1512 powershell.exe 30 PID 1512 wrote to memory of 1112 1512 powershell.exe 30 PID 704 wrote to memory of 1888 704 POWERSHELL.exe 34 PID 704 wrote to memory of 1888 704 POWERSHELL.exe 34 PID 704 wrote to memory of 1888 704 POWERSHELL.exe 34 PID 1888 wrote to memory of 1696 1888 cmd.exe 35 PID 1888 wrote to memory of 1696 1888 cmd.exe 35 PID 1888 wrote to memory of 1696 1888 cmd.exe 35 PID 1888 wrote to memory of 1688 1888 cmd.exe 36 PID 1888 wrote to memory of 1688 1888 cmd.exe 36 PID 1888 wrote to memory of 1688 1888 cmd.exe 36 PID 1888 wrote to memory of 1164 1888 cmd.exe 37 PID 1888 wrote to memory of 1164 1888 cmd.exe 37 PID 1888 wrote to memory of 1164 1888 cmd.exe 37 PID 1164 wrote to memory of 288 1164 cmd.exe 38 PID 1164 wrote to memory of 288 1164 cmd.exe 38 PID 1164 wrote to memory of 288 1164 cmd.exe 38
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fa9fe798ce4705a1ccbb22f8cb813c84e4abce585413eb7e26f0934443e75dbd.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\WEAZNVCMXZAAQLAKIPOINAQ\WEAZNVCMXZAAQLAKIPOINAQ.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\WEAZNVCMXZAAQLAKIPOINAQ\WEAZNVCMXZAAQLAKIPOINAQ.vbs"3⤵PID:1112
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\POWERSHELL.exePOWERSHELL -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\WEAZNVCMXZAAQLAKIPOINAQ\WEAZNVCMXZAAQLAKIPOINAQ.bat1⤵
- Process spawned unexpected child process
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\system32\cmd.execmd /c ""C:\ProgramData\WEAZNVCMXZAAQLAKIPOINAQ\WEAZNVCMXZAAQLAKIPOINAQ.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f3⤵
- Modifies registry class
- Modifies registry key
PID:1696
-
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\IDontExist.dll /f3⤵
- Registers COM server for autorun
- Modifies registry class
- Modifies registry key
PID:1688
-
-
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\WEAZNVCMXZAAQLAKIPOINAQ\TIOLAMAQZCXELAASSIUYRE.ps1'"3⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\WEAZNVCMXZAAQLAKIPOINAQ\TIOLAMAQZCXELAASSIUYRE.ps1'"4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680KB
MD5913fe9d33cd6ef2c4ebc889f4049fcb1
SHA181e4d4e544826c094d6495bd480d12a560c97383
SHA25685f77b983b441d538d075e87735e258404bc13f6675926d0c1c31536174b4247
SHA51290ab84610401dc35145a4a20e874d67a7bac4a3b10148a282c9ec6721de9540f1fa23429bcd875adeae76bc13b5525ae237149589afeaacb4493191ecb5fa483
-
Filesize
707B
MD571b7d7741aba59c5a096986dd27a085c
SHA19f7f17aae92e12885f7e5ed0ae2102765f07ae0f
SHA2563e3b898765a75dbda0e4c37940d37afb415f9355ebe1ec3ca0b507f29b1a3b61
SHA51249bbe38d0c8baf47f14cb9f8377374da4f49c0427b95f96c30662f04838742bd1076b464b881723ffe45f5430ce0cb0826a5b51fe80182658608cdb160c70006
-
Filesize
3KB
MD5ab20632280fe70bb33581771ef8fe878
SHA1aad5a8e65a1f303eb9c74801a3a6eef1f3b35845
SHA256890aef85a88c0e67d232ff49486bec704ba08388ff38bfa46dc82c174c67e06f
SHA512828f12ccc30a2bfd741570bae849f0f44b88b0b7c00ff969690fec43f072615a42243726b6096918dfec249abd1d74e3878d31bac6ab8558f97858a74f9d8c69
-
Filesize
1KB
MD59e5180857489aa1194c07ae92b511f41
SHA125dc65d65d7a5bbfcdc296f159cd873ea4f892db
SHA25687b4be8edf48f7c11a1798c345f2835cc873d467f839a380acdea6755ec30721
SHA5127a0c633fc8722f64a42aef2b679bbb00b771e3689a2daece3cf463729ec2fd0c292f7dc44d9599313ceefd667ddcd7d59becaca32d4cedf953f4fccd97f39977
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD597f981bde22e780e8437e4523b755cec
SHA1647afe4b5b9de9cbb365d0cabce0e1b30db4e0c8
SHA25638c928e713a93edc634ac0426772ef288854a113956d52a4115f0bcce5922c8f
SHA512aca185aa44c07f8228c822d6ff97a62990de742637355c33363a905816ee0b88dba0e7a83469e503a597bcb4398fd074dc79a61a243a22d704f9cebb77e9fa6a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD597f981bde22e780e8437e4523b755cec
SHA1647afe4b5b9de9cbb365d0cabce0e1b30db4e0c8
SHA25638c928e713a93edc634ac0426772ef288854a113956d52a4115f0bcce5922c8f
SHA512aca185aa44c07f8228c822d6ff97a62990de742637355c33363a905816ee0b88dba0e7a83469e503a597bcb4398fd074dc79a61a243a22d704f9cebb77e9fa6a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57051c6495c3fee6bb4e2855f78b96bf5
SHA1ae984304e7f75633f946d87d04a963f20635ab30
SHA256ab39f89d3dd35f9f24639a85e471d6001e22430a5cb73c68320ba8e8732f0e36
SHA512d9029add54b5fcfc38aa3ff15e7315ec0441412d0c9063924bfbb5b86617c0081125b5ee976cd97dff21779c16ed9092b37ce20d6b713f866767bef295680089
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q65BELNEPSFPC5DYJGJY.temp
Filesize7KB
MD597f981bde22e780e8437e4523b755cec
SHA1647afe4b5b9de9cbb365d0cabce0e1b30db4e0c8
SHA25638c928e713a93edc634ac0426772ef288854a113956d52a4115f0bcce5922c8f
SHA512aca185aa44c07f8228c822d6ff97a62990de742637355c33363a905816ee0b88dba0e7a83469e503a597bcb4398fd074dc79a61a243a22d704f9cebb77e9fa6a