Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2023, 14:50

General

  • Target

    Client.exe

  • Size

    7KB

  • MD5

    0942702afc756667e0260c811571c48a

  • SHA1

    01b0b8e076ff25d22415fece6c3461e6a40b5660

  • SHA256

    38f1ad3d84b03d2c5641d6a3864d7936bf7efecf5e5afa6eb3eeaeefa54b75aa

  • SHA512

    5d8d30379b3d6d120f1ec618f223f6d16d688a4572dbd0baa370342db6aef568efecad079a55b35227716e0ed1ed5a4e049705e3c731fe4c0fca7acdc09a6e7c

  • SSDEEP

    96:UOv6SyQzxHLFdzP5zkdlRa0xcRvOqYhND+t/Gz4ozc6f7hnuCBfzNt:BUQBxzkhc9OqYHG/Gsodf7hnuoJ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" start notepad.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\system32\notepad.exe"
        3⤵
          PID:2212
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" start notepad.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\Windows\SysWOW64\notepad.exe
          "C:\Windows\system32\notepad.exe"
          3⤵
            PID:1288

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        1KB

        MD5

        def65711d78669d7f8e69313be4acf2e

        SHA1

        6522ebf1de09eeb981e270bd95114bc69a49cda6

        SHA256

        aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

        SHA512

        05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        15KB

        MD5

        fb3d090724cad152b94b97751c4831d3

        SHA1

        870bdb9d5e976ca69354276c313440f55cb2fe9e

        SHA256

        415b8534e2c15519f972f1d1b3d3a20227b5f0065dba80d0ebc71b4b7767b1a9

        SHA512

        5b9c90e9c577b948d41cfd2447f74268da9754bd31be8fc292808e79823a7aa32b7d251c3e7743da34e2f9bee166d611738fa4fe2174b1fbb3856e90fba893d7

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5xc3coke.nsz.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/1688-133-0x00000000001C0000-0x00000000001C8000-memory.dmp

        Filesize

        32KB

      • memory/1688-134-0x0000000004C40000-0x0000000004C50000-memory.dmp

        Filesize

        64KB

      • memory/1688-135-0x0000000004B20000-0x0000000004B86000-memory.dmp

        Filesize

        408KB

      • memory/3424-141-0x0000000005A30000-0x0000000005A96000-memory.dmp

        Filesize

        408KB

      • memory/3424-140-0x00000000051D0000-0x00000000051F2000-memory.dmp

        Filesize

        136KB

      • memory/3424-139-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/3424-137-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/3424-151-0x0000000006180000-0x000000000619E000-memory.dmp

        Filesize

        120KB

      • memory/3424-152-0x0000000007190000-0x0000000007226000-memory.dmp

        Filesize

        600KB

      • memory/3424-153-0x0000000006680000-0x000000000669A000-memory.dmp

        Filesize

        104KB

      • memory/3424-154-0x00000000066F0000-0x0000000006712000-memory.dmp

        Filesize

        136KB

      • memory/3424-155-0x00000000077E0000-0x0000000007D84000-memory.dmp

        Filesize

        5.6MB

      • memory/3424-138-0x00000000052C0000-0x00000000058E8000-memory.dmp

        Filesize

        6.2MB

      • memory/3424-136-0x0000000004BB0000-0x0000000004BE6000-memory.dmp

        Filesize

        216KB

      • memory/4436-169-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

        Filesize

        64KB

      • memory/4436-170-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

        Filesize

        64KB