Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
z.ps1
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
z.ps1
Resource
win10v2004-20240226-en
General
-
Target
z.ps1
-
Size
879B
-
MD5
b1b9f0a88530b0bab19a3df123950423
-
SHA1
7e9ac27ab2453fc444091d4768d90321941bc17f
-
SHA256
4431712d10e9f14bcbd31dba91597782d4a4edafa88ca78eb5118ff7446f4566
-
SHA512
19c41cbd459bd3f41275ce69729c6d17daadd3c85dd072d950d69b7f55d062febe502e1a62b98e2cf66a8a9f07e8cfc11dec811b343b1fb1dfc4f077cc6e1d07
Malware Config
Extracted
bitrat
1.38
193.233.132.136:4404
-
communication_password
93d93f0d629d26b535ee4c950717ab2b
-
tor_process
tor
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 1 4168 powershell.exe -
Processes:
resource yara_rule behavioral2/memory/3320-21-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-25-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-26-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-28-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-27-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-29-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-31-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-32-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-33-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-34-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-35-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-36-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-37-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-39-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-40-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-41-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-42-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-46-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-47-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-48-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-49-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-50-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-51-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-52-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-53-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-54-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-55-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-56-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-57-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-58-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-59-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-60-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-61-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-62-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-63-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-64-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-65-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-69-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-73-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-77-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-81-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-85-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/3320-89-0x0000000000400000-0x00000000007D2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "wscript //E:VBScript C:\\Users\\Public\\0x.log //Nologo" powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
RegSvcs.exepid process 3320 RegSvcs.exe 3320 RegSvcs.exe 3320 RegSvcs.exe 3320 RegSvcs.exe 3320 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4168 set thread context of 3320 4168 powershell.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepid process 4168 powershell.exe 4168 powershell.exe 4168 powershell.exe 4168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4168 powershell.exe Token: SeShutdownPrivilege 3320 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegSvcs.exepid process 3320 RegSvcs.exe 3320 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
powershell.execmd.exedescription pid process target process PID 4168 wrote to memory of 1396 4168 powershell.exe cmd.exe PID 4168 wrote to memory of 1396 4168 powershell.exe cmd.exe PID 1396 wrote to memory of 832 1396 cmd.exe attrib.exe PID 1396 wrote to memory of 832 1396 cmd.exe attrib.exe PID 4168 wrote to memory of 3204 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3204 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3204 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3320 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3320 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3320 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3320 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3320 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3320 4168 powershell.exe RegSvcs.exe PID 4168 wrote to memory of 3320 4168 powershell.exe RegSvcs.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\z.ps11⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib +h C:\Users\Public\0x.log2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\attrib.exeattrib +h C:\Users\Public\0x.log3⤵
- Views/modifies file attributes
PID:832
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
62KB
MD534d6b90b676cf2fe59153c0c01b59278
SHA1396c2789cf583c24b047976dc91584aa703c067a
SHA256acec28de93d3ea0afc8d7101cadc56f07ef03492d1b398769c2d20e358b3b846
SHA512f20cfcd266b691c70f530b92244dd80eddbd5a5c19d1c08bd6b330ff15217e8fef5ca221adabdc75fc2ac1cb4aae8e729073fe85e13c43a89f5cb56c0310af2f