Analysis
-
max time kernel
137s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
InstProgAll.ps1
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
InstProgAll.ps1
Resource
win10v2004-20230703-en
General
-
Target
InstProgAll.ps1
-
Size
10KB
-
MD5
3bbcdac7696a52e2e883c5b438d445d7
-
SHA1
ef24f8f37ecc3cadf3a6b63d8755d06b17641a54
-
SHA256
5112ca9d431058b74618c66107091aac0a486bada0477d125c4a03eff4d6ed87
-
SHA512
12629bb6791c80d9e73c58a1cf5e2c17d78edf4e122e188a2b38a54e5fe34ff8d704d8dcc24b06ee379e644986ab59064da5c7a562fc4313a9e87f1513382c2a
-
SSDEEP
192:ep39xdTnKr9ID6U8p/pR7mSOdtyzTNXQaQGRCgP:w9xZnO9ID8phRKSUITNT3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Kills process with taskkill 2 IoCs
pid Process 2676 taskkill.exe 2744 taskkill.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1688 powershell.exe 1688 powershell.exe 1688 powershell.exe 2824 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2108 explorer.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1688 powershell.exe Token: SeIncreaseQuotaPrivilege 1688 powershell.exe Token: SeSecurityPrivilege 1688 powershell.exe Token: SeTakeOwnershipPrivilege 1688 powershell.exe Token: SeLoadDriverPrivilege 1688 powershell.exe Token: SeSystemProfilePrivilege 1688 powershell.exe Token: SeSystemtimePrivilege 1688 powershell.exe Token: SeProfSingleProcessPrivilege 1688 powershell.exe Token: SeIncBasePriorityPrivilege 1688 powershell.exe Token: SeCreatePagefilePrivilege 1688 powershell.exe Token: SeBackupPrivilege 1688 powershell.exe Token: SeRestorePrivilege 1688 powershell.exe Token: SeShutdownPrivilege 1688 powershell.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeSystemEnvironmentPrivilege 1688 powershell.exe Token: SeRemoteShutdownPrivilege 1688 powershell.exe Token: SeUndockPrivilege 1688 powershell.exe Token: SeManageVolumePrivilege 1688 powershell.exe Token: 33 1688 powershell.exe Token: 34 1688 powershell.exe Token: 35 1688 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeShutdownPrivilege 2852 powercfg.exe Token: SeShutdownPrivilege 2704 powercfg.exe Token: SeShutdownPrivilege 2704 powercfg.exe Token: SeShutdownPrivilege 2704 powercfg.exe Token: SeShutdownPrivilege 2704 powercfg.exe Token: SeShutdownPrivilege 2704 powercfg.exe Token: SeCreatePagefilePrivilege 2704 powercfg.exe Token: SeShutdownPrivilege 2780 powercfg.exe Token: SeShutdownPrivilege 2700 powercfg.exe Token: SeShutdownPrivilege 2844 powercfg.exe Token: SeShutdownPrivilege 2732 powercfg.exe Token: SeDebugPrivilege 2676 taskkill.exe Token: SeDebugPrivilege 2744 taskkill.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe Token: SeShutdownPrivilege 2108 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe 2108 explorer.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2824 1688 powershell.exe 30 PID 1688 wrote to memory of 2824 1688 powershell.exe 30 PID 1688 wrote to memory of 2824 1688 powershell.exe 30 PID 1688 wrote to memory of 1968 1688 powershell.exe 32 PID 1688 wrote to memory of 1968 1688 powershell.exe 32 PID 1688 wrote to memory of 1968 1688 powershell.exe 32 PID 1688 wrote to memory of 2852 1688 powershell.exe 33 PID 1688 wrote to memory of 2852 1688 powershell.exe 33 PID 1688 wrote to memory of 2852 1688 powershell.exe 33 PID 1688 wrote to memory of 2704 1688 powershell.exe 34 PID 1688 wrote to memory of 2704 1688 powershell.exe 34 PID 1688 wrote to memory of 2704 1688 powershell.exe 34 PID 1688 wrote to memory of 2780 1688 powershell.exe 35 PID 1688 wrote to memory of 2780 1688 powershell.exe 35 PID 1688 wrote to memory of 2780 1688 powershell.exe 35 PID 1688 wrote to memory of 2700 1688 powershell.exe 36 PID 1688 wrote to memory of 2700 1688 powershell.exe 36 PID 1688 wrote to memory of 2700 1688 powershell.exe 36 PID 1688 wrote to memory of 2844 1688 powershell.exe 37 PID 1688 wrote to memory of 2844 1688 powershell.exe 37 PID 1688 wrote to memory of 2844 1688 powershell.exe 37 PID 1688 wrote to memory of 2732 1688 powershell.exe 38 PID 1688 wrote to memory of 2732 1688 powershell.exe 38 PID 1688 wrote to memory of 2732 1688 powershell.exe 38 PID 1688 wrote to memory of 2676 1688 powershell.exe 39 PID 1688 wrote to memory of 2676 1688 powershell.exe 39 PID 1688 wrote to memory of 2676 1688 powershell.exe 39 PID 1688 wrote to memory of 2744 1688 powershell.exe 40 PID 1688 wrote to memory of 2744 1688 powershell.exe 40 PID 1688 wrote to memory of 2744 1688 powershell.exe 40 PID 1688 wrote to memory of 2108 1688 powershell.exe 41 PID 1688 wrote to memory of 2108 1688 powershell.exe 41 PID 1688 wrote to memory of 2108 1688 powershell.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\InstProgAll.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" if (Get-WindowsOptionalFeature -online -FeatureName NetFx3 | Where-Object State -eq Enabled){write-host ".Net 3.0 already installed"}else {Write-Host "Enabling .Net 3.0..."; DISM /online /enable-feature /featurename:netfx3; write-host "Done"}; if(Get-PackageProvider | Where-Object Name -eq NuGet){write-host "NuGet already installed."}else{Write-host "Installing NuGet..."; Install-PackageProvider NuGet -Force}; if(Get-installedmodule | Where-Object Name -eq PSWindowsupdate){write-host "PSWindows Update already installed."}else{Write-host "Installing PS Windows Update..."; Install-module PSWindowsUpdate -force}; Write-host "Running Windows Update"; Get-WindowsUpdate -verbose -AcceptAll -Install -AutoReboot2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\w32tm.exe"C:\Windows\system32\w32tm.exe" /resync /force2⤵PID:1968
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /setactive 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /hibernate off2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 0012ee47-9041-4b5d-9b77-535fba8b1442 6738e2c4-e8a5-4a42-b16a-e040e769756e 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 238c9fa8-0aad-41ed-83f4-97be242c8f20 29f6c1db-86da-48c5-9fdb-f2b67b1f44da 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 238c9fa8-0aad-41ed-83f4-97be242c8f20 9d7815a6-7ee4-497e-8888-515a05f02364 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /setacvalueindex 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 501a4d13-42af-4429-9fd1-a8218c268e20 ee12f906-d277-404b-b6da-e5fa1a576df5 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /IM explorer.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /IM chrome.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57255330ea2902dc274103d18049464de
SHA1c8e8d531699a290f1848613a508cdd804bfcafce
SHA25688ff2b6064f9497b28c1c52f7eeea7143cabe9b8b286996ccd92d0ec134071a6
SHA512c455ea9d9ea25b99d055ebe3a1ca10c9b0b0be21108128ac986ce9e1d95291d048a37c7133a3970bf3ce8aa9d228800b143ae0ae326b74d0a0804eaacdc3d3b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EO862N3LJLOR9I4HI5U1.temp
Filesize7KB
MD57255330ea2902dc274103d18049464de
SHA1c8e8d531699a290f1848613a508cdd804bfcafce
SHA25688ff2b6064f9497b28c1c52f7eeea7143cabe9b8b286996ccd92d0ec134071a6
SHA512c455ea9d9ea25b99d055ebe3a1ca10c9b0b0be21108128ac986ce9e1d95291d048a37c7133a3970bf3ce8aa9d228800b143ae0ae326b74d0a0804eaacdc3d3b2
-
Filesize
628B
MD541bc8a5962f3bf125a38e8c99f4002d2
SHA13971df6acde1477718aceda331c02dedca78b4cc
SHA25682728e4c27f95f38681d5773f7fc9dbc85bc42f21a4e4c891e4460f14cf0f392
SHA512f5907ddbb644384f399624cd55918c6f77af15d2436b181d2fb20ec03704dd44695c3ece632e51e5fff7b4b2bb076042a215f242b621f758579da233d3181a98