Overview
overview
10Static
static
1PMOy4QqKcU...PF.zip
windows7-x64
1PMOy4QqKcU...PF.zip
windows10-2004-x64
11.bat
windows7-x64
11.bat
windows10-2004-x64
1detonator.cmd
windows7-x64
4detonator.cmd
windows10-2004-x64
7dqjg.ps1
windows7-x64
1dqjg.ps1
windows10-2004-x64
1dqjg.vbs
windows7-x64
1dqjg.vbs
windows10-2004-x64
3th5rk551.uku.ps1
windows7-x64
1th5rk551.uku.ps1
windows10-2004-x64
1vuso.ps1
windows7-x64
1vuso.ps1
windows10-2004-x64
10Analysis
-
max time kernel
98s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 13:17
Static task
static1
Behavioral task
behavioral1
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
1.bat
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
1.bat
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
detonator.cmd
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
detonator.cmd
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
dqjg.ps1
Resource
win7-20230703-en
Behavioral task
behavioral8
Sample
dqjg.ps1
Resource
win10v2004-20230621-en
Behavioral task
behavioral9
Sample
dqjg.vbs
Resource
win7-20230703-en
Behavioral task
behavioral10
Sample
dqjg.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
th5rk551.uku.ps1
Resource
win7-20230703-en
Behavioral task
behavioral12
Sample
th5rk551.uku.ps1
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
vuso.ps1
Resource
win7-20230703-en
General
-
Target
dqjg.ps1
-
Size
125B
-
MD5
e1b26d57301dd20ec11d8ccd7773bd6b
-
SHA1
ba166cf9ce418fa1f2449145757f90bd62290122
-
SHA256
fba319eab7709626794b7d7df3bccb40cb94e9bf848d87514048ee63e3a72167
-
SHA512
90e15fadf0811df2a019b1f0d38a1b012d2721aab2e541f73628bfa967b3a40b96e747ce5272ab039b7093b3e7a11484c57916b90269aec18956f0441657cd32
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 692 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 692 wrote to memory of 1832 692 powershell.exe 29 PID 692 wrote to memory of 1832 692 powershell.exe 29 PID 692 wrote to memory of 1832 692 powershell.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\dqjg.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn dqjg /tr C:\ProgramData\dqjg\dqjg.vbs2⤵
- Creates scheduled task(s)
PID:1832
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {148E4333-704E-4CDC-8558-D0AA4C1A4236} S-1-5-21-2813141852-3076131560-4232376420-1000:GASCZFTR\Admin:Interactive:[1]1⤵PID:456