Overview
overview
10Static
static
1PMOy4QqKcU...PF.zip
windows7-x64
1PMOy4QqKcU...PF.zip
windows10-2004-x64
11.bat
windows7-x64
11.bat
windows10-2004-x64
1detonator.cmd
windows7-x64
4detonator.cmd
windows10-2004-x64
7dqjg.ps1
windows7-x64
1dqjg.ps1
windows10-2004-x64
1dqjg.vbs
windows7-x64
1dqjg.vbs
windows10-2004-x64
3th5rk551.uku.ps1
windows7-x64
1th5rk551.uku.ps1
windows10-2004-x64
1vuso.ps1
windows7-x64
1vuso.ps1
windows10-2004-x64
10Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 13:17
Static task
static1
Behavioral task
behavioral1
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
1.bat
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
1.bat
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
detonator.cmd
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
detonator.cmd
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
dqjg.ps1
Resource
win7-20230703-en
Behavioral task
behavioral8
Sample
dqjg.ps1
Resource
win10v2004-20230621-en
Behavioral task
behavioral9
Sample
dqjg.vbs
Resource
win7-20230703-en
Behavioral task
behavioral10
Sample
dqjg.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
th5rk551.uku.ps1
Resource
win7-20230703-en
Behavioral task
behavioral12
Sample
th5rk551.uku.ps1
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
vuso.ps1
Resource
win7-20230703-en
General
-
Target
1.bat
-
Size
87B
-
MD5
cdc83500ec30d3d435f4a5fca2fb9c99
-
SHA1
418f2d8fe427cc1bcfffd66689325300737f7d07
-
SHA256
12a6ad12fa23cc100d4a982746c5520f4de1cd7638de579e2040daf2ec2a2e2e
-
SHA512
96b5560bbbfa9055f4e1208b46ee6b0c7486d6ecb4f311dd4724ed3b09c862002e10fc1dd6b892b4bfe47798713f055f053fed16bc45f834f94140550c3eb732
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 440 wrote to memory of 2400 440 cmd.exe 29 PID 440 wrote to memory of 2400 440 cmd.exe 29 PID 440 wrote to memory of 2400 440 cmd.exe 29 PID 2400 wrote to memory of 2388 2400 cmd.exe 30 PID 2400 wrote to memory of 2388 2400 cmd.exe 30 PID 2400 wrote to memory of 2388 2400 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\system32\cmd.exeCMD /C powershell -NOP -WIND HIDDEN -eXEC BYPASS -NONI "C:\ProgramData\dqjg\vuso.ps1"2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NOP -WIND HIDDEN -eXEC BYPASS -NONI "C:\ProgramData\dqjg\vuso.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-