Analysis
-
max time kernel
842s -
max time network
843s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
code.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
code.ps1
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral3
Sample
code.ps1
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
code.ps1
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral5
Sample
code.ps1
Resource
macos-20231201-en
General
-
Target
code.ps1
-
Size
124B
-
MD5
3fc6c3824bb4de57d5cde48463007ec8
-
SHA1
99c22d5899583d3f6c1500e5dc054460b19f0931
-
SHA256
3b66e25772d06d13ce6b7136cec3c26736435c21ad08b464d86d655ba5714787
-
SHA512
7bb02a5263f1c59d843dce92150eb4e7f21ef50c6ab714318d0136c7e8dadc5f2d0dd9c8f5bc767887947e1cf6a2211fb22edcfbea1c6554c3d0c647cff9c6da
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2692 NETSTAT.EXE -
Runs regedit.exe 1 IoCs
pid Process 2716 regedit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2020 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 regedit.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2716 2020 powershell.exe 30 PID 2020 wrote to memory of 2716 2020 powershell.exe 30 PID 2020 wrote to memory of 2716 2020 powershell.exe 30 PID 2020 wrote to memory of 2692 2020 powershell.exe 29 PID 2020 wrote to memory of 2692 2020 powershell.exe 29 PID 2020 wrote to memory of 2692 2020 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\code.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" /?2⤵
- Gathers network information
PID:2692
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:2716
-