Analysis

  • max time kernel
    1557s
  • max time network
    1562s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2024 00:01

General

  • Target

    decode_Fakeupdate.ps1

  • Size

    4KB

  • MD5

    de20d86ec1a1e85bfbc5745a03a38e51

  • SHA1

    3558b1d1c1049f8852a79162e98ad201f1ba5426

  • SHA256

    ccc71819287c931ddf6625bfede42bc3cce4ffc61795cc955822fc981564fbc5

  • SHA512

    243ddbc84f0ca0f319f68028e39331f196c6085756a12820f78f996a47700ecf8066b681d265ecdbcead4439ec67e307e739acd2a07a759cb001b4170d501b9b

  • SSDEEP

    96:lrlrvxj+/ZFAAIxnkIh3qa9RDyj5tsMemPYTall:l5IjMku6e1yjXsMemPYOll

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 9 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\decode_Fakeupdate.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2452
  • C:\Windows\system32\verclsid.exe
    "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
    1⤵
      PID:2272
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" t -an -ai#7zMap23436:78:7zEvent32534
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2636
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\OutputFile\" -spe -an -ai#7zMap14151:78:7zEvent24613
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1304
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"
      1⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2976
    • C:\Windows\System32\CScript.exe
      "C:\Windows\System32\CScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"
      1⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:1520
    • C:\Windows\System32\CScript.exe
      "C:\Windows\System32\CScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"
      1⤵
      • Blocklisted process makes network request
      PID:2232
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js"
      1⤵
      • Blocklisted process makes network request
      PID:2716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\518DFDD116D9AD0210609502E2F95908

      Filesize

      317B

      MD5

      dd982383a2370b4ffbee127c259c9bf6

      SHA1

      32a17db6fff1558e9c58e0a0b4f9ae716739f60f

      SHA256

      e09c36d4677c9986b0766345054bd522b0b7352b5b1bf60762ef925b925d0668

      SHA512

      696a59808de4d380f4c89eb512472200315cc7c1d4d3e5abd7a71639f2eed273dfe8a1943556f367e1debbb3f504ce235ddf58056e3947596ba67c040c78c6b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25

      Filesize

      1KB

      MD5

      a99377a27910f2447a1d4c78a1d55540

      SHA1

      2d82c4bd9ef86fae0cede0bde4d85a52304c5cb2

      SHA256

      cd3094c0df506297237c88653680d7a4e83e613696e78c30b99e428fde3c4b48

      SHA512

      406df06cbe6c28a5908bd66ab0f0d71b7e06ef8347410850f97188cfc5575c471ea388a12c5d93dbace884f8328df7ad828940b6c442e691e72d73fa8bc853a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19

      Filesize

      977B

      MD5

      50cb447f2a8f99cb126cb51392696c7f

      SHA1

      80c4b991dd02b94f2d96eb07da7f197d5e3196a9

      SHA256

      0d00728a79f840f071f85740efff9a27ec0c7d1f489511b5b7c4c861767aa059

      SHA512

      d99eb91f441ba2fddbb6bd0f7a19d51452a5d45fd24315ddfb1f744d2866b3d4d481e2aef38f1eff31f5434979439c4415780b7e6b0d9f15b4a56f9cb2d3d97c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\518DFDD116D9AD0210609502E2F95908

      Filesize

      508B

      MD5

      6a906dae979160cc38690f1d352c94d4

      SHA1

      44f2eaa4c27ca2e8b81e9ec4737eba8fc4f31737

      SHA256

      60470f75c221df39daf0ff4731454b099c6b1bb864e315ff7481a3cab12fba60

      SHA512

      c73b4072d56e7d03345f7c9b35c19a953c97e6634326f33e8168e292c84fd6720e168d38a2e2a35ed3b8c35c8588f389ab87b5d13538444ab05e84ae982b1e73

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b3ea2fcc28b34a25c714e1ff404c84a7

      SHA1

      817864f54fa8643a903e9f3846afc6de6041af9e

      SHA256

      e6467c8cd87c853c6cd511e9fd19b35e0cd65e06cb3ebb974d1a34b2609485bc

      SHA512

      4869323d018fe2530351fb3326b3e971dcad5feaecab227fe0039f2828646bf89b6b15e65d07eac62bdeddf870ebbfa3137c0eea3ac5c2657cca6deea9d71b9d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25

      Filesize

      482B

      MD5

      58d2b498923d2a7171f3c1464034538f

      SHA1

      c5062003aff10f00d9ab93d6f5123ea19631b1bc

      SHA256

      faf899b6f3ac833628c1efbd93d27da061cc1963a98edfdf37e47d486e4779c3

      SHA512

      e59fb17902ecc9abf0a78f4fb85ab5b11d94d628e589af7d20cbcce17b8b91b3f47ca70642dbd29d99e08f8969640e373e4568ffefc0650667ad9ec865031c86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19

      Filesize

      484B

      MD5

      737ad2506b55bec9c625ecbfa076e901

      SHA1

      cc77ad110d8a14344fcd4c58817c4b9bb461006a

      SHA256

      ffa79a8465a808647206f0cf744e45316e7024c980e3bc3dcab5e88738ad500f

      SHA512

      60b57ecbb0b6e2a0ac7d68f3d7730c4a76d5541ec7844adf73789ccd23e165184ee029c4241a6c28ed9917b285a5f585bb03bed175f16b0b997be389f6d3e9da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      4fe466f733bd255dc17b63225916f744

      SHA1

      adb27e46d9431b0bdfc06f48f3ba24e4f6029f2e

      SHA256

      f16ab95d636c8124d690d68788fad5f0e0fee10ecabc14e81f8cb8e433cd57ac

      SHA512

      93bc924b7dd97e7805228a87dcd8ce3b15deddec8f59fd9bf8e4e5d58af3c120cb6cb39c75d00e4f512915fce98cfee22e2effd28fadc08e06d3541b37e9afbb

    • C:\Users\Admin\AppData\Local\Temp\CabDBC1.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarDBF2.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\Desktop\OutputFile.zip

      Filesize

      2KB

      MD5

      99b9486516ec3ddab05bcfaa6324b34b

      SHA1

      ae320bea3bfdc991dbcd08a7f66bf50c7a93d55e

      SHA256

      3b8d115ec85816a2c145ae8a4867bdc4b0eb5dc5c685c948ae1e24bb26bf30eb

      SHA512

      600be81c0fd78c4993e09c5bd292c1fa24738cf2b01b78c4c0f7594446176387b8d36d980bb16156a7f866aa64b2779ef02812a90887d3a9ec7b96a75f64ed50

    • C:\Users\Admin\Desktop\OutputFile\Version.89.3512.58.js

      Filesize

      5KB

      MD5

      6a554ad7f1c931ce492818411bb3a80a

      SHA1

      53434b9ee9fb4ba0978daba61bb12342fc519c80

      SHA256

      2e5b08a46a45f6f311e09b6b944593ab499fb581ab6c53528e777f1080ca3085

      SHA512

      fc03ffdf63813df3c3696d8ca2d3b124834eeb9bc40608048b802ebd9d6213a365f656e94ee1d2836f71e64432554192ea1479399a0d37b88023be978c66cfe0

    • memory/2452-5-0x000007FEF5830000-0x000007FEF61CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2452-13-0x000007FEF5830000-0x000007FEF61CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2452-11-0x00000000028C0000-0x0000000002940000-memory.dmp

      Filesize

      512KB

    • memory/2452-10-0x000007FEF5830000-0x000007FEF61CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2452-7-0x00000000028C0000-0x0000000002940000-memory.dmp

      Filesize

      512KB

    • memory/2452-8-0x00000000023E0000-0x00000000023E8000-memory.dmp

      Filesize

      32KB

    • memory/2452-9-0x00000000028C0000-0x0000000002940000-memory.dmp

      Filesize

      512KB

    • memory/2452-6-0x00000000028C0000-0x0000000002940000-memory.dmp

      Filesize

      512KB

    • memory/2452-4-0x000000001B260000-0x000000001B542000-memory.dmp

      Filesize

      2.9MB