Analysis

  • max time kernel
    147s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2024 16:48

General

  • Target

    deimos.ps1

  • Size

    12.4MB

  • MD5

    3d66aa2521f3e024a926350ac22c0622

  • SHA1

    e92999c0809b144c20f0ceac95e9e39cd788124a

  • SHA256

    2de324d57bb96154e70958eea97713553f59025ca39220aec5d53c908cbf4645

  • SHA512

    1dd56755dd7dfa322d25cf4733417e099e63ba688e6173f01ff7abe825a5c6685362bae3026908f13f0a110e2a3d0377ea9cb3457e4ae46e450be300d3af9fd0

  • SSDEEP

    49152:t4h5SOsvIuP8mqGsqFnv5GQDuam+yZncMLhfbfUlSe+dPR9DV4mmabYp8Q76Xiji:C

Malware Config

Signatures

  • Jupyter, SolarMarker

    Jupyter is a backdoor and infostealer first seen in mid 2020.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\deimos.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\urpd2m1b\urpd2m1b.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES593C.tmp" "c:\Users\Admin\AppData\Local\Temp\urpd2m1b\CSCBC1274B54DFF4A3FA985CF10BE847E22.TMP"
        3⤵
          PID:4448
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9ea646f8,0x7ffc9ea64708,0x7ffc9ea64718
          3⤵
            PID:4780
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
            3⤵
              PID:1436
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3592
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
              3⤵
                PID:3980
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                3⤵
                  PID:2820
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                  3⤵
                    PID:1296
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:1
                    3⤵
                      PID:2284
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=4872 /prefetch:6
                      3⤵
                        PID:100
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:8
                        3⤵
                          PID:1576
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1456
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                          3⤵
                            PID:768
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1
                            3⤵
                              PID:4908
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                              3⤵
                                PID:5188
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                                3⤵
                                  PID:5196
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12168170551744197461,15692098043369491696,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:2
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4520
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4628
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3288

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  9f44d6f922f830d04d7463189045a5a3

                                  SHA1

                                  2e9ae7188ab8f88078e83ba7f42a11a2c421cb1c

                                  SHA256

                                  0ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a

                                  SHA512

                                  7c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  7740a919423ddc469647f8fdd981324d

                                  SHA1

                                  c1bc3f834507e4940a0b7594e34c4b83bbea7cda

                                  SHA256

                                  bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221

                                  SHA512

                                  7ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  4ffe49ef12e524f0f1a02b3a689f0754

                                  SHA1

                                  79799f248062c8fb4cdcc9b941331dc2da524957

                                  SHA256

                                  f59fa0225e369816d1d9c78c1a9a7bdb922ba4eba82f12a85a80a6e0f20bb211

                                  SHA512

                                  f7134b35e22b2359681c95ae9cc8f28abb85773ff2c946b34ef23d494ad3f1d22f6e537ad69282a4c8acde75b7b9c4e9a6b3ddf625a0a970f7d675e19acf4ede

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  14ac9583331ce914cd30455b9b835980

                                  SHA1

                                  1f2a9dc29313fc5036bc78c4d7aea723e99759fa

                                  SHA256

                                  4b85507f188bfc0a20f3d5d242df43a62fff470ac990778c5cb79ea92ebec443

                                  SHA512

                                  2e523f0ea51a662227ea2ba5f995cb122445f5e3b6c76974e3246ec69034c38ca2f7fb5f940416fe81918a207e123075059fde7b7337f556bfea1d2972074d0e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  025f9317f6ac4ee96d2553b520905bf9

                                  SHA1

                                  61a2eb893246abb4e4ddcbd754c99ae2fc0fc515

                                  SHA256

                                  715dff2acbb78956f10a90de192c0b66aabcd0a312e90ed2257b1ed6ce9b1b70

                                  SHA512

                                  b51ed1b9a19fd9d38337bd6445bb77aebe87b858840ea140a2cbd16854de89d4df5d9ab222508734a5e4672849df1d204f7fa27a5cd395ae14d62a936ddb2e41

                                • C:\Users\Admin\AppData\Local\Temp\RES593C.tmp

                                  Filesize

                                  1KB

                                  MD5

                                  af255d19955e5c4f42667974d69fce34

                                  SHA1

                                  1fff5d9493332906313c246c17fe6a489e2ecfbf

                                  SHA256

                                  3d762c5ac85eaa8bec58529c281fdda0d4ebfcfd0d325a7e35b7cab32721e0f9

                                  SHA512

                                  4e0d7798b695398a80b6a2aebd2fc784795a4d071812af19b2f49f2aa08b6fa42b013b7251921572b02a31b158e54650dbb52682f4d498b6670809737b8fa3e3

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mqwfm21c.ha4.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\urpd2m1b\urpd2m1b.dll

                                  Filesize

                                  3KB

                                  MD5

                                  7f23bd6abf5285473d2222dd025f593a

                                  SHA1

                                  b4f8f99b5ead8b1f6010cdcdc30070b2483a5aa5

                                  SHA256

                                  51d1834b3c12dafb0c4da34cb528fbe2e537fafc03ebb5d7d06838821cfce023

                                  SHA512

                                  90e01c74b44d593b8ea97866ef4c2c1f690dd16a6d8d4b131f17f8a7aa2262176893d6b338447167516a19407b433011cb6dc86b89f625bd9e8b91c284af1f11

                                • C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf

                                  Filesize

                                  1.4MB

                                  MD5

                                  4b64ef8f4d8b83fbcaed3bf0699c9a8b

                                  SHA1

                                  b32298453049f44d8725a841ce111e89150442ef

                                  SHA256

                                  8cbff8420057614191158c80126bc1102b6c64ba646733406bc5a09dcd22e977

                                  SHA512

                                  ef49f81cd9eca7eaf3169597e7272c9570430b477fa6f7941877df8432e8fd7c507124dbd589d44da12ec1ec2578cdd926e5026d5277cc9fb1a514199d51a616

                                • \??\c:\Users\Admin\AppData\Local\Temp\urpd2m1b\CSCBC1274B54DFF4A3FA985CF10BE847E22.TMP

                                  Filesize

                                  652B

                                  MD5

                                  540583717be95b2d8bf3b9c2fd2c7434

                                  SHA1

                                  f960a91835e54523de0ab3ce5dc40aef23424f4f

                                  SHA256

                                  24d246672977288d4694530883eef745d40d1ee634a2f47bfd954addaa8dd132

                                  SHA512

                                  fe01d2ad11ec91700430337216c3a664d839f9ade197426b8cab27adb9264a2458ee53dd86fcae549b7bbcb541975f6f35374d01736fd1f19cfdf38fe0968faf

                                • \??\c:\Users\Admin\AppData\Local\Temp\urpd2m1b\urpd2m1b.0.cs

                                  Filesize

                                  244B

                                  MD5

                                  b999975748af32dd007ff48814430b26

                                  SHA1

                                  46b54a3e3be2d3497127d67b96b3f6a55d26447d

                                  SHA256

                                  ed13935d6ac43e5ce0419aa7d162dbc70562c02dedacb81d5efdfc609a035c69

                                  SHA512

                                  f8e48caaac395db45ac4c8a899dbd64305dd6f57fcd22919a6d880b035455286d3504b097dca250d4ea283004cb64d47e376901b8fae65f4fa792234dee9f81e

                                • \??\c:\Users\Admin\AppData\Local\Temp\urpd2m1b\urpd2m1b.cmdline

                                  Filesize

                                  369B

                                  MD5

                                  9bff6c807177929631b5669338177579

                                  SHA1

                                  4d1d4139b98dcf33340d586309bebbff209f2fa4

                                  SHA256

                                  6a6bdd63d2e915f1e65ea7b15affb8047f295f1e4387cc09bd9f7852ba2e9211

                                  SHA512

                                  8fa58edd0aa9a388288f3f6e9375bf300ac668289f58537db8e7f4a2945d986110f9a789c7ce6b8e26d933bbe35225498ce9318df40d986f8ebf893d4e1764ce

                                • memory/2160-29-0x0000024ABF7A0000-0x0000024ABF876000-memory.dmp

                                  Filesize

                                  856KB

                                • memory/2160-24-0x0000024ABF270000-0x0000024ABF278000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2160-0-0x0000024ABF280000-0x0000024ABF2A2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/2160-11-0x0000024ABEEF0000-0x0000024ABEF00000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2160-10-0x00007FFCA7080000-0x00007FFCA7B41000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/2160-80-0x00007FFCA7080000-0x00007FFCA7B41000-memory.dmp

                                  Filesize

                                  10.8MB