Resubmissions
15/04/2024, 15:04
240415-sftvzsbe51 808/04/2024, 10:37
240408-mn29faad6t 125/03/2024, 12:10
240325-pcfbmsfb49 828/11/2023, 12:14
231128-pefp7ahg9v 828/11/2023, 10:30
231128-mj2gcahc28 815/05/2023, 08:26
230515-kb2q2ahh2t 819/04/2023, 08:41
230419-klhe5shd66 814/02/2023, 10:51
230214-mxtnnacg59 804/01/2023, 12:47
230104-p1dgysah51 8Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2023, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
from_r_techsupport_post_zfbprl.ps1
Resource
win10v2004-20231127-en
General
-
Target
from_r_techsupport_post_zfbprl.ps1
-
Size
3KB
-
MD5
78d2189dbf09d4cfb9985729c0985067
-
SHA1
d61c81fedbaaf26ca14082f29ed008dca2520e3b
-
SHA256
2573edb9592715b7e0048056279d6d707c959fe815148f733e60b4eb0fca3aea
-
SHA512
30dbc2210dcdf8f67635096dd5f87c12b84443b879761462524e5f8d8b5ea0f13cf891f2c0da95c23c2455418dad2d6b92786a8b4efbd7f40d0f1e675c200e77
Malware Config
Signatures
-
Blocklisted process makes network request 60 IoCs
flow pid Process 77 840 powershell.exe 79 840 powershell.exe 80 840 powershell.exe 81 840 powershell.exe 82 840 powershell.exe 83 840 powershell.exe 84 840 powershell.exe 85 840 powershell.exe 86 840 powershell.exe 87 840 powershell.exe 88 840 powershell.exe 89 840 powershell.exe 90 840 powershell.exe 91 840 powershell.exe 92 840 powershell.exe 93 840 powershell.exe 96 840 powershell.exe 98 840 powershell.exe 101 840 powershell.exe 102 840 powershell.exe 103 840 powershell.exe 104 840 powershell.exe 105 840 powershell.exe 106 840 powershell.exe 107 840 powershell.exe 108 840 powershell.exe 112 840 powershell.exe 113 840 powershell.exe 114 840 powershell.exe 115 840 powershell.exe 116 840 powershell.exe 117 840 powershell.exe 118 840 powershell.exe 119 840 powershell.exe 120 840 powershell.exe 121 840 powershell.exe 122 840 powershell.exe 123 840 powershell.exe 124 840 powershell.exe 125 840 powershell.exe 126 840 powershell.exe 127 840 powershell.exe 128 840 powershell.exe 129 840 powershell.exe 130 840 powershell.exe 131 840 powershell.exe 132 840 powershell.exe 133 840 powershell.exe 134 840 powershell.exe 135 840 powershell.exe 136 840 powershell.exe 137 840 powershell.exe 138 840 powershell.exe 141 840 powershell.exe 143 840 powershell.exe 144 840 powershell.exe 145 840 powershell.exe 146 840 powershell.exe 147 840 powershell.exe 148 840 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3592 powershell.exe 3592 powershell.exe 840 powershell.exe 840 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3592 powershell.exe Token: SeDebugPrivilege 840 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3592 wrote to memory of 840 3592 powershell.exe 90 PID 3592 wrote to memory of 840 3592 powershell.exe 90
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\from_r_techsupport_post_zfbprl.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82