Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07/08/2023, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
short.ps1
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
short.ps1
Resource
win10v2004-20230703-en
General
-
Target
short.ps1
-
Size
1KB
-
MD5
4d05108541bedc5f7a9f609f9061ce9d
-
SHA1
3cb702c417563ab13c6776f1633af1b96b299db4
-
SHA256
9fb547fac2c1d73cce68ad7f184b084dda5e3352b3bcb556e7d0a1868c06125d
-
SHA512
a6425ad446014a9af20ba953241e0381b7b539dfd18dd4a176a5d799296db3581c5b8387e29fdc76a54d5b7b5dabdde80967501765125d815e9ab4e6b74ad55e
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2080 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.bat powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2416 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2080 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2080 powershell.exe Token: SeShutdownPrivilege 520 shutdown.exe Token: SeRemoteShutdownPrivilege 520 shutdown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 WINWORD.EXE 2416 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2416 2080 powershell.exe 31 PID 2080 wrote to memory of 2416 2080 powershell.exe 31 PID 2080 wrote to memory of 2416 2080 powershell.exe 31 PID 2080 wrote to memory of 2416 2080 powershell.exe 31 PID 2080 wrote to memory of 520 2080 powershell.exe 32 PID 2080 wrote to memory of 520 2080 powershell.exe 32 PID 2080 wrote to memory of 520 2080 powershell.exe 32 PID 2416 wrote to memory of 2944 2416 WINWORD.EXE 34 PID 2416 wrote to memory of 2944 2416 WINWORD.EXE 34 PID 2416 wrote to memory of 2944 2416 WINWORD.EXE 34 PID 2416 wrote to memory of 2944 2416 WINWORD.EXE 34
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\short.ps11⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\paypal.rtf"2⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2944
-
-
-
C:\Windows\system32\shutdown.exe"C:\Windows\system32\shutdown.exe" /r /f /t 9002⤵
- Suspicious use of AdjustPrivilegeToken
PID:520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c8a7efb42db7364f3625a053e141b1fd
SHA17ea3a9898aca76f9439af28eb2143ca4c220fc0c
SHA2562019fe019fbdf2a859d8a180f796346623e1ab9bc413257c63bdcefe49521406
SHA5128497f02a11b4b2f66c7eaea7fa8e020e6756b8c64f86e705facffe4cc68eb5afe06b7e2408e258cbf1ede588f8abb18edaf95fb18b4ee2d3d182568f87bd245f
-
Filesize
10KB
MD536d201da06db690c243a38fc791fc90c
SHA12c0637516ee2ab45ed7404b5c91ec054c6efd281
SHA25603f9d6e19ea827c4cc317e06ffe15c5bdb49d930cac1c175cbfa38d7d104565f
SHA51278287219cf00762c104ff05560ea0081ae67626de47af2a433ec82bdbc9e758238074c9a08578cace9429a17ed15ec296051a656cb46dee111de12048b5e5a67