Analysis

  • max time kernel
    137s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2023, 08:26

General

  • Target

    InstProgAll.ps1

  • Size

    10KB

  • MD5

    3bbcdac7696a52e2e883c5b438d445d7

  • SHA1

    ef24f8f37ecc3cadf3a6b63d8755d06b17641a54

  • SHA256

    5112ca9d431058b74618c66107091aac0a486bada0477d125c4a03eff4d6ed87

  • SHA512

    12629bb6791c80d9e73c58a1cf5e2c17d78edf4e122e188a2b38a54e5fe34ff8d704d8dcc24b06ee379e644986ab59064da5c7a562fc4313a9e87f1513382c2a

  • SSDEEP

    192:ep39xdTnKr9ID6U8p/pR7mSOdtyzTNXQaQGRCgP:w9xZnO9ID8phRKSUITNT3

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\InstProgAll.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" if (Get-WindowsOptionalFeature -online -FeatureName NetFx3 | Where-Object State -eq Enabled){write-host ".Net 3.0 already installed"}else {Write-Host "Enabling .Net 3.0..."; DISM /online /enable-feature /featurename:netfx3; write-host "Done"}; if(Get-PackageProvider | Where-Object Name -eq NuGet){write-host "NuGet already installed."}else{Write-host "Installing NuGet..."; Install-PackageProvider NuGet -Force}; if(Get-installedmodule | Where-Object Name -eq PSWindowsupdate){write-host "PSWindows Update already installed."}else{Write-host "Installing PS Windows Update..."; Install-module PSWindowsUpdate -force}; Write-host "Running Windows Update"; Get-WindowsUpdate -verbose -AcceptAll -Install -AutoReboot
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2824
    • C:\Windows\system32\w32tm.exe
      "C:\Windows\system32\w32tm.exe" /resync /force
      2⤵
        PID:1968
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" /setactive 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2852
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" /hibernate off
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 0012ee47-9041-4b5d-9b77-535fba8b1442 6738e2c4-e8a5-4a42-b16a-e040e769756e 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2780
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 238c9fa8-0aad-41ed-83f4-97be242c8f20 29f6c1db-86da-48c5-9fdb-f2b67b1f44da 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2700
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 238c9fa8-0aad-41ed-83f4-97be242c8f20 9d7815a6-7ee4-497e-8888-515a05f02364 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 501a4d13-42af-4429-9fd1-a8218c268e20 ee12f906-d277-404b-b6da-e5fa1a576df5 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\system32\taskkill.exe
        "C:\Windows\system32\taskkill.exe" /IM explorer.exe /f
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
      • C:\Windows\system32\taskkill.exe
        "C:\Windows\system32\taskkill.exe" /IM chrome.exe /f
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2744
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        2⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2108

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      7255330ea2902dc274103d18049464de

      SHA1

      c8e8d531699a290f1848613a508cdd804bfcafce

      SHA256

      88ff2b6064f9497b28c1c52f7eeea7143cabe9b8b286996ccd92d0ec134071a6

      SHA512

      c455ea9d9ea25b99d055ebe3a1ca10c9b0b0be21108128ac986ce9e1d95291d048a37c7133a3970bf3ce8aa9d228800b143ae0ae326b74d0a0804eaacdc3d3b2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EO862N3LJLOR9I4HI5U1.temp

      Filesize

      7KB

      MD5

      7255330ea2902dc274103d18049464de

      SHA1

      c8e8d531699a290f1848613a508cdd804bfcafce

      SHA256

      88ff2b6064f9497b28c1c52f7eeea7143cabe9b8b286996ccd92d0ec134071a6

      SHA512

      c455ea9d9ea25b99d055ebe3a1ca10c9b0b0be21108128ac986ce9e1d95291d048a37c7133a3970bf3ce8aa9d228800b143ae0ae326b74d0a0804eaacdc3d3b2

    • C:\Users\Public\Desktop\TCWG_Support.lnk

      Filesize

      628B

      MD5

      41bc8a5962f3bf125a38e8c99f4002d2

      SHA1

      3971df6acde1477718aceda331c02dedca78b4cc

      SHA256

      82728e4c27f95f38681d5773f7fc9dbc85bc42f21a4e4c891e4460f14cf0f392

      SHA512

      f5907ddbb644384f399624cd55918c6f77af15d2436b181d2fb20ec03704dd44695c3ece632e51e5fff7b4b2bb076042a215f242b621f758579da233d3181a98

    • memory/1688-64-0x0000000002460000-0x00000000024E0000-memory.dmp

      Filesize

      512KB

    • memory/1688-82-0x0000000002460000-0x00000000024E0000-memory.dmp

      Filesize

      512KB

    • memory/1688-63-0x0000000002460000-0x00000000024E0000-memory.dmp

      Filesize

      512KB

    • memory/1688-58-0x000000001B1E0000-0x000000001B4C2000-memory.dmp

      Filesize

      2.9MB

    • memory/1688-61-0x0000000002460000-0x00000000024E0000-memory.dmp

      Filesize

      512KB

    • memory/1688-60-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1688-62-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1688-78-0x0000000002460000-0x00000000024E0000-memory.dmp

      Filesize

      512KB

    • memory/1688-77-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1688-83-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1688-59-0x0000000002500000-0x0000000002508000-memory.dmp

      Filesize

      32KB

    • memory/1688-76-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2108-81-0x0000000001EC0000-0x0000000001EC1000-memory.dmp

      Filesize

      4KB

    • memory/2108-84-0x0000000001EC0000-0x0000000001EC1000-memory.dmp

      Filesize

      4KB

    • memory/2108-88-0x0000000003960000-0x0000000003970000-memory.dmp

      Filesize

      64KB

    • memory/2824-70-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2824-75-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2824-74-0x0000000002AF0000-0x0000000002B70000-memory.dmp

      Filesize

      512KB

    • memory/2824-73-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

      Filesize

      9.6MB

    • memory/2824-72-0x0000000002AF0000-0x0000000002B70000-memory.dmp

      Filesize

      512KB

    • memory/2824-71-0x0000000002AF0000-0x0000000002B70000-memory.dmp

      Filesize

      512KB