Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-06-2023 08:22
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume1/Users/strial_tenant/Downloads/script1.ps1
Resource
win7-20230220-en
General
-
Target
Device/HarddiskVolume1/Users/strial_tenant/Downloads/script1.ps1
-
Size
457KB
-
MD5
6cf32568a97a0cb8fe75acbe6cac8db2
-
SHA1
80e1d3113e12220910c5419abfa35aeaa7f3a0b1
-
SHA256
e34d98ea875e0ba6842ad296ebf6ea8fc908c6988fe50d7bf5cbb86787d73171
-
SHA512
5571adfcb274c58acae6b2dd629efe470fed23c3732507f15a46d5b00a99f186f922a0797ef1ccd0de8d5b7681f305521d1edebf990726bbf5fa5a8b464b0ddb
-
SSDEEP
6144:UVDFV/A8nNKmbcRTUufYbE6N4tDeaBfLo1sHsl9yS/M0HixBNqrpB92bMDsA4nxX:mnND98MDe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1408 powershell.exe 1408 powershell.exe 1408 powershell.exe 780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1408 powershell.exe Token: SeDebugPrivilege 780 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1652 1408 powershell.exe 29 PID 1408 wrote to memory of 1652 1408 powershell.exe 29 PID 1408 wrote to memory of 1652 1408 powershell.exe 29 PID 1652 wrote to memory of 760 1652 WScript.exe 30 PID 1652 wrote to memory of 760 1652 WScript.exe 30 PID 1652 wrote to memory of 760 1652 WScript.exe 30 PID 760 wrote to memory of 780 760 cmd.exe 32 PID 760 wrote to memory of 780 760 cmd.exe 32 PID 760 wrote to memory of 780 760 cmd.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume1\Users\strial_tenant\Downloads\script1.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Unlimited\ISO\Binnot.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\System32\cmd.execmd /c ""C:\ProgramData\Unlimited\ISO\Binnot.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Unlimited\ISO\Binnot.ps14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5f1d747a7825a5db756d428a5254d244e
SHA17db56fe57492bd856c787cd2a836eff4f2ce5e01
SHA2565863b76caee43b2f1efdd2322f2e5731b1537d1deeb35e860cd75a8304fe4ddf
SHA5124b1f63df96b8f9e2a381855974b2efab5bd48ae342b1e29a51661d0514ba6f8e62d23e3e58a9a9f978d39880ab03a9b9bf72ab52a546a965da20daa18c4d246d
-
Filesize
781B
MD558ef18971b1520648e0c6d67036251ff
SHA168bd1ee657ff233f6a1ee453914aaecdeb845284
SHA256226b14799e579e28954937fa3ffdb7d0e5dcd10360b35c329a7246a23be4b4b3
SHA5129b7f04aca4b3e2af5aafdc9ea30c1722722d668078bea8b0aaa2394d0cb50ac75716fb9173d4084bd5a9cfaa279bd94404b64c140532daa5b3bdd66842f332d2
-
Filesize
204B
MD58444901b66d6f83f3a684f1b44646868
SHA169c9c40aef3734959b4ce5f07005bf13c07646f9
SHA256cfeaafc87ceec9986f37f6a42ecfa39260f98c951404df95da5e074141add5da
SHA5127493b0d40c9c914c8968b42752b1d14d415e7bccff07f9bf2ab976d77517e12a456f142ee786527c4e536fab3e4156b21ce353f51f5925bbc405937ad7929bbb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD582e15fd9b103646064e7f9312cf37164
SHA1e09eac4c428b4885e005406770aa522f6cc00093
SHA256d9b6a4c6bb1fe8b021fe606d974e9a1b3e428fb53c8588e527ec6fc94c1868bb
SHA51266fefebd09139600fb781147d1e266091f158d37ca83900a0d88bb1c68bc09ee79e60f7f0b5a50580c59b18b4a172ed490b251eeb5210122e5e887166bb18b52