Analysis
-
max time kernel
16s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
settings.ps1
Resource
win7-20231020-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
settings.ps1
Resource
win10v2004-20231023-en
8 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
settings.ps1
-
Size
21KB
-
MD5
d4a8463332d11c465c311485626a089e
-
SHA1
ddc07ff6160187c0b48d9b1d34aa05af90483bd9
-
SHA256
dff3d7a15b8ff7fada4397088a658bc79d47c0d387ee9a3c710490d73983395a
-
SHA512
1b385c68fc3e6212c5339b7cfb23816c9ad9bbf9c8c42d817a85b6f26b8014b238815819ff8de4cc79c4fc095be4d5b8a111b3b20c5e695f502fce7bbdc40217
-
SSDEEP
384:QcyvJh/drDCNrr2YyHEHaeizHlf2GkxUtJNFw5ARMthKqsvvvhUvhkvkNp8mpdFm:QcyvJh/drDCNrr2Yyk6eizFf2GkxUtJb
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1868 powershell.exe 4 1868 powershell.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_nuefwb2_y.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_nuefwb2_.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_nuefwb2_EX.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_nuefwb2_AT.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_nuefwb2_AA.lnk powershell.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\ms-settings\Shell\Open\command powershell.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\ms-settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\ms-settings\Shell powershell.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\ms-settings\Shell\Open powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\ms-settings\Shell\Open\command\DelegateExecute powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\ms-settings\Shell\Open\command\ = "C:\\_nuefwb2_\\_nuefwb2_i7.exe" powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1868 powershell.exe Token: SeShutdownPrivilege 2072 shutdown.exe Token: SeRemoteShutdownPrivilege 2072 shutdown.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2072 1868 powershell.exe 29 PID 1868 wrote to memory of 2072 1868 powershell.exe 29 PID 1868 wrote to memory of 2072 1868 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\settings.ps11⤵
- Blocklisted process makes network request
- Drops startup file
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\shutdown.exe"C:\Windows\system32\shutdown.exe" /r /t 102⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2592
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2280