Analysis
-
max time kernel
601s -
max time network
606s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 16:32
Static task
static1
Behavioral task
behavioral1
Sample
file.ps1
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.ps1
Resource
win10v2004-20230703-en
General
-
Target
file.ps1
-
Size
2KB
-
MD5
4341f14ce11e21d7e43dee728e1b4047
-
SHA1
919d810e102a40c4809b462793eeff8de2850b66
-
SHA256
58c5a4b24012b564948e0fdc7bb0ea68fa87e97425c2df85ee2cafc9904c71b1
-
SHA512
6d1781b303f169f94a247ca811d693e7d191e7c071a6eea69471d30dafbd71115cfac6c504eed9f2b3b813c19b292e582fc684530d094711a9484e16ba8d2ec3
Malware Config
Signatures
-
Blocklisted process makes network request 42 IoCs
flow pid Process 18 3428 powershell.exe 20 3428 powershell.exe 34 3428 powershell.exe 46 3428 powershell.exe 51 3428 powershell.exe 52 3428 powershell.exe 53 3428 powershell.exe 61 3428 powershell.exe 62 3428 powershell.exe 63 3428 powershell.exe 65 3428 powershell.exe 68 3428 powershell.exe 75 3428 powershell.exe 76 3428 powershell.exe 78 3428 powershell.exe 80 3428 powershell.exe 83 3428 powershell.exe 85 3428 powershell.exe 86 3428 powershell.exe 88 3428 powershell.exe 90 3428 powershell.exe 91 3428 powershell.exe 92 3428 powershell.exe 93 3428 powershell.exe 95 3428 powershell.exe 96 3428 powershell.exe 98 3428 powershell.exe 99 3428 powershell.exe 100 3428 powershell.exe 101 3428 powershell.exe 102 3428 powershell.exe 103 3428 powershell.exe 105 3428 powershell.exe 106 3428 powershell.exe 107 3428 powershell.exe 108 3428 powershell.exe 109 3428 powershell.exe 110 3428 powershell.exe 111 3428 powershell.exe 112 3428 powershell.exe 114 3428 powershell.exe 116 3428 powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ powershell.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe 3428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3428 powershell.exe Token: SeIncreaseQuotaPrivilege 3428 powershell.exe Token: SeSecurityPrivilege 3428 powershell.exe Token: SeTakeOwnershipPrivilege 3428 powershell.exe Token: SeLoadDriverPrivilege 3428 powershell.exe Token: SeSystemProfilePrivilege 3428 powershell.exe Token: SeSystemtimePrivilege 3428 powershell.exe Token: SeProfSingleProcessPrivilege 3428 powershell.exe Token: SeIncBasePriorityPrivilege 3428 powershell.exe Token: SeCreatePagefilePrivilege 3428 powershell.exe Token: SeBackupPrivilege 3428 powershell.exe Token: SeRestorePrivilege 3428 powershell.exe Token: SeShutdownPrivilege 3428 powershell.exe Token: SeDebugPrivilege 3428 powershell.exe Token: SeSystemEnvironmentPrivilege 3428 powershell.exe Token: SeRemoteShutdownPrivilege 3428 powershell.exe Token: SeUndockPrivilege 3428 powershell.exe Token: SeManageVolumePrivilege 3428 powershell.exe Token: 33 3428 powershell.exe Token: 34 3428 powershell.exe Token: 35 3428 powershell.exe Token: 36 3428 powershell.exe Token: SeIncreaseQuotaPrivilege 3428 powershell.exe Token: SeSecurityPrivilege 3428 powershell.exe Token: SeTakeOwnershipPrivilege 3428 powershell.exe Token: SeLoadDriverPrivilege 3428 powershell.exe Token: SeSystemProfilePrivilege 3428 powershell.exe Token: SeSystemtimePrivilege 3428 powershell.exe Token: SeProfSingleProcessPrivilege 3428 powershell.exe Token: SeIncBasePriorityPrivilege 3428 powershell.exe Token: SeCreatePagefilePrivilege 3428 powershell.exe Token: SeBackupPrivilege 3428 powershell.exe Token: SeRestorePrivilege 3428 powershell.exe Token: SeShutdownPrivilege 3428 powershell.exe Token: SeDebugPrivilege 3428 powershell.exe Token: SeSystemEnvironmentPrivilege 3428 powershell.exe Token: SeRemoteShutdownPrivilege 3428 powershell.exe Token: SeUndockPrivilege 3428 powershell.exe Token: SeManageVolumePrivilege 3428 powershell.exe Token: 33 3428 powershell.exe Token: 34 3428 powershell.exe Token: 35 3428 powershell.exe Token: 36 3428 powershell.exe Token: SeIncreaseQuotaPrivilege 3428 powershell.exe Token: SeSecurityPrivilege 3428 powershell.exe Token: SeTakeOwnershipPrivilege 3428 powershell.exe Token: SeLoadDriverPrivilege 3428 powershell.exe Token: SeSystemProfilePrivilege 3428 powershell.exe Token: SeSystemtimePrivilege 3428 powershell.exe Token: SeProfSingleProcessPrivilege 3428 powershell.exe Token: SeIncBasePriorityPrivilege 3428 powershell.exe Token: SeCreatePagefilePrivilege 3428 powershell.exe Token: SeBackupPrivilege 3428 powershell.exe Token: SeRestorePrivilege 3428 powershell.exe Token: SeShutdownPrivilege 3428 powershell.exe Token: SeDebugPrivilege 3428 powershell.exe Token: SeSystemEnvironmentPrivilege 3428 powershell.exe Token: SeRemoteShutdownPrivilege 3428 powershell.exe Token: SeUndockPrivilege 3428 powershell.exe Token: SeManageVolumePrivilege 3428 powershell.exe Token: 33 3428 powershell.exe Token: 34 3428 powershell.exe Token: 35 3428 powershell.exe Token: 36 3428 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\file.ps11⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82