Analysis

  • max time kernel
    843s
  • max time network
    850s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 15:08

General

  • Target

    OwJViJVcVDtGwyBrPZixBrwr.ps1

  • Size

    5KB

  • MD5

    48ec3b15711ce5f49ee79e8cbf8c0f1f

  • SHA1

    9d263753c22d21681fbde1bda539beee56ded769

  • SHA256

    9a4e39fcb4033a9c849890085b67faea7265eaf56744e77aa8180b1834b7e14a

  • SHA512

    61f7696e8c0dcf59e354fcbbdaa0aa0845a2b2d02d3762a7410a83cb211db87d571dea95308db54aaf060189627dbe4785ee951a28a7ba152e973555424d808e

  • SSDEEP

    96:0NNYJo13C6KjlHHCiGqPaHPgfnRk+qPIKsO1ezfgmwqPoase1ejvysKEO1ezfgmX:8Oo1NKjNwqPaHPgfnR7qPIKsO1dbqPoX

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\OwJViJVcVDtGwyBrPZixBrwr.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2676
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.concur.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11ea5f1c7cd662687b412507fc876df4

    SHA1

    3e95152a34375fda69d0e3b0c7bbf1ee1ac0cf44

    SHA256

    51418e8a0cb4ab6dc0fd5a51324a8cdada93c0e24bf8f648ee992bffff36e4cc

    SHA512

    3146e4bc955a31ccbbfb8bddef03812ff5566c5a6c2aa80c6bed958b7d98a77e936f8dcf09aa9b2ac860f152d7fb08358dc2ed3c1254755e80a677fe8be1fde2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    603b3ec2b88260c319b681fb9582ed66

    SHA1

    2e389da4858a9128cb8c21baa88622edad001a84

    SHA256

    5b62765a31cf9d4a09a82570b41b2a27356902f94e440d78ed005d3ba5de190b

    SHA512

    03c189ad78d091dbef29b4de98950716afeda4def1ceb10d4d54e497928415695550733aa315ebd4bcb48405d326d9d0f6c21e34c94b6d0def62132636726632

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb65be4932b0834c6acffdb26d105529

    SHA1

    77572576dd3862f863ced52336df517927b849fe

    SHA256

    4f83b9d09608d50b591fb2523efd1d92b8284a2a21dc8e3ad2763947dfa91188

    SHA512

    c887e2d71e5eac84b192456d79bd3a80ceeb4744d1f1443557ed89d1c12d7cac4dc7b4d8ed5215b933bffca76fc66598e9a2d8e8ef2ac9b768cb39d3a03d3429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    55468a83aeb4b3c8cb78946ad61a50ea

    SHA1

    be78f12366a348dfe4a9015299858cd48339d60b

    SHA256

    d0bb90a9adbfc8993e24b9b3aabcc3c4d9a5465b1a11d2a578f8d3148590ac50

    SHA512

    a4692de1dc97f8818abe930308d86ccde1cefea990cf89c87488466319903b9420d9b3790c4639e8423ce7feb4647f55a20c871d8f4d1c38b48e10c697a43433

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf1ce011ac849c67f799bc166b4f48f1

    SHA1

    97ed42ebaee79e612c690e08b9d8b283726a8573

    SHA256

    2ffcb30dad6878b52ff266355ae1cfa7f2a70d9c924cc8d6eb3ca6766d2e74ba

    SHA512

    17a50c60aaf6a8db019f12e09619de8b83d6d8efcad32c29e47158877eb0c1c0662af226206bcb05e6495effd81a85a38b7dd9b698ad983635c11d82972e1dde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    848b7d506bdbe4c904c14957711f4605

    SHA1

    385a8ca7ee5039f15b1973f88b47683cbf292987

    SHA256

    129ce3b4c6c3b291990f4a7505b2f49a0510b43361741f858426cd1f3d5d5818

    SHA512

    089892555b266e18ce3e3fa9b87f083a71f09313edbbfb3541a51f2f6ac6a882bfb9cc935d497a926d41ce77adc0ac5ac7cbdb6d9e8ea951b316abd727a6556b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a3d6bc27553bcd89f1c98913e647c78

    SHA1

    ec33f360979f08e7b86173815df305103a744628

    SHA256

    d07b6c10a89451fc7697e150a0ba60aae28ed10cabf34656e7b4942d4e4b19ab

    SHA512

    117f7d4479a68c48f01456a082e317515cbf1d513232bb63eb04412a0461c993516c4a0af41a1bb116121873918688d1c48d303e978a6aa18c2a3f63066a4e00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf8dbb7f408a18d2e4f3f610fbc2eada

    SHA1

    e9b9b43c925bac20f9e8d54faa9f43aeccf7babd

    SHA256

    65f8bc16cbf5a4f9205c7a3254a3ecdac87a35b6373a0e29f20bf2d79f13b946

    SHA512

    bd78dd23e5d6e2726b83c0b7181b416d0330319226523cb5f8d4927f59e1392f343b2d30deb0bb04325d778b153ade44c7a1ae70d709cd941f01c461a43566b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fdd5e6df5c7dced19a663e393f57d64

    SHA1

    818ec927ca841c8ebe632f827a8184a9f4026eb1

    SHA256

    70609e96ff21ab3c6c3e9ea0c47225fc40ea09ecebb35c06a3ae10188789e1a6

    SHA512

    c3d8238dd867e5bd0978c869a1a59507546d5d138f7eb501736ad566a32d5e3811faf01f0688a7bf5fdfd53ca70fdd9b36c1dd6b067e2cfad251df3d996e9231

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3851f822d6eb4999a01c3b865cf36f7c

    SHA1

    a6d1ccdb27e7dac0f5cbd14c5548662b75a4f558

    SHA256

    94bebf9c6d3d7d2cc9e9d1f47e3564c0277fbfea1bf9b998315d1909b871b008

    SHA512

    10a01f7e8a1780e9cb64b67e8746e75455e18c73d0aa07af6f28b213f0011886272250b98b29b92e4725f46b9f459ad05406362a114989833e5d0c9ecd43adca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a18715889af26b6f292843cb529d4cde

    SHA1

    59e3b99dfc7c41f2b99353556f15f4fa068a99b0

    SHA256

    aac4120c492a593a3399f198e3f7be602e2933dcb3df2c709faee94aecada760

    SHA512

    6162ece2fea5db5c9dcc7e56932997d8c4a1a704733d404c5de8a1fcf609fc97c06946ab80fff1386ffdce4973956e552f6a58b85aa5fcd5b043cb1d04ac096b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f8ddbc9acfa52bebcf1c9cf8d33247a

    SHA1

    e257ba0e73b1f3b1572e3da8f3417b87419945e5

    SHA256

    517549e6fca86f819409eec822f7a621be71439bed5fa4c331bd6b1480b745ce

    SHA512

    34763693a2c9f582b00f306287de2b18939e9152fd429d5800d536eeef4b1e74ebc2d59a6044bb039b2c8bc20e8750999031ced5a40d527016122f3b075800e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6fe6b5e1c6148a7842091ad21a66a78

    SHA1

    e193decbe7988ac2903bd795e9c797f436857167

    SHA256

    a59dd714844f6fb3062476a53076e9077dff4904c8ef28c580cac824d06989c9

    SHA512

    23dc8f503db72af3df1030a7b105e2e1752e6ca36fb01f094d3d5c2f97e046c09aacf525b3e55b35115082e16e5b77aa2e66d7f88e6759fc823b845ed1effa05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8556aa2838bb813677dd9f38789a32a5

    SHA1

    631afb8cf6f9dec98f8f74cd725432d6f85ae368

    SHA256

    a7bdc2d17ca3072eb1faab99fa908cc4429fd28c0d6e23962d503acf9dc88a6b

    SHA512

    05f502ff898f92538c3d8460eb5585130534f215e6b1761263cb1d70532a5e919709a9d13304a8574ec2fbfa8561ecc209618913fd3aa663abc7eeb250273d38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84e2c6a4d37936456d56aba280a871b0

    SHA1

    527893aea54dbb01cdb3cd967bb6ec110a5a5739

    SHA256

    42ab45562377c8f6bdcdcb93ea0c7941755ba8a5e17db78b11a006f97ad55da9

    SHA512

    ef6f93d2f0a3d90a37d8368e2358aa5f52ec1e5b82dde7c1de6da0811fd72006c803e5a8e0a8b8c221263dab57247510263ea83cb4f1ed386a56fb20d3e2d1d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75d93da9534636101956fca853508a02

    SHA1

    cd615895829f941f0feb13e6b3f2fdd9a065be32

    SHA256

    921926394fe0168defe17327439ef819fab00e4f736cc3e741a007ac31c39f4e

    SHA512

    310f07784729421e212a235750eb49c0f7a162ddf545e3a3d42b7e44b2df1d5086eed3764fc04c0085f4f11d2440e43beff0d3ebe285cb4ac3beb6620f862ebd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0169f38296089dc2ec9e20eba4d343d

    SHA1

    b1fe8f90fe57365b7f8ca5199e610a68317e4099

    SHA256

    2bcaa4f4cf25eaf522f9d07a4c7a1a53d9f668b4b00c822ecea3f8fc6a8c2e1c

    SHA512

    4303625d7aae76d481c34a6f6521633c67345426d966b5dcb4ce7c24a357c5712293dc6c5ba32ee187c0f6b09716d954909734c707752d9372482544e86f715b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92bb49f0093a788498d298a7ee5c1938

    SHA1

    807ff113fc9ff41f830889a1b1d7a2ec9962ac22

    SHA256

    836829874fe1f9436fd18ca4f7cb073467c83458c6e12572c9c577da849c3227

    SHA512

    36f5d60c06dcdfdd4afecaafe3dd6baa77a77d0891d625c965bb948a08ab60643169161d93a2840f0bdfcbd16bdc227ea15a2dba5ef7dc5c238665615c0deaf9

  • C:\Users\Admin\AppData\Local\Temp\CabDD2A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarDD2B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\TarEA8E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    385b6d27fa3ceb7bc205cc0c6e1acf41

    SHA1

    f1b5a5b2efcf11f830a4baf19b21a3ee01621df9

    SHA256

    4a9fd2cb361b38a39779a3155a4b7d086f8a529c68e002663f4225143f9bd785

    SHA512

    d54dd08143acadaa956cd5f7b9992aa4839c16f1088fa021f17a00477b5f44a4b69a778d85d446542c44f6d797785b635cd3774c3e1df4a0a6df18d8341d2b87

  • memory/2516-6-0x000007FEF57D0000-0x000007FEF616D000-memory.dmp

    Filesize

    9.6MB

  • memory/2516-25-0x000007FEF57D0000-0x000007FEF616D000-memory.dmp

    Filesize

    9.6MB

  • memory/2516-4-0x000000001B330000-0x000000001B612000-memory.dmp

    Filesize

    2.9MB

  • memory/2516-13-0x0000000002A30000-0x0000000002A62000-memory.dmp

    Filesize

    200KB

  • memory/2516-7-0x00000000029B0000-0x0000000002A30000-memory.dmp

    Filesize

    512KB

  • memory/2516-8-0x000007FEF57D0000-0x000007FEF616D000-memory.dmp

    Filesize

    9.6MB

  • memory/2516-10-0x00000000029B0000-0x0000000002A30000-memory.dmp

    Filesize

    512KB

  • memory/2516-11-0x00000000029B0000-0x0000000002A30000-memory.dmp

    Filesize

    512KB

  • memory/2516-5-0x0000000002290000-0x0000000002298000-memory.dmp

    Filesize

    32KB

  • memory/2516-9-0x00000000029B0000-0x0000000002A30000-memory.dmp

    Filesize

    512KB

  • memory/2516-12-0x0000000002A30000-0x0000000002A62000-memory.dmp

    Filesize

    200KB

  • memory/2676-24-0x0000000002A30000-0x0000000002AB0000-memory.dmp

    Filesize

    512KB

  • memory/2676-20-0x0000000002A30000-0x0000000002AB0000-memory.dmp

    Filesize

    512KB

  • memory/2676-19-0x000007FEF57D0000-0x000007FEF616D000-memory.dmp

    Filesize

    9.6MB

  • memory/2676-23-0x0000000002A30000-0x0000000002AB0000-memory.dmp

    Filesize

    512KB

  • memory/2676-22-0x0000000002A30000-0x0000000002AB0000-memory.dmp

    Filesize

    512KB

  • memory/2676-21-0x000007FEF57D0000-0x000007FEF616D000-memory.dmp

    Filesize

    9.6MB

  • memory/2676-26-0x000007FEF57D0000-0x000007FEF616D000-memory.dmp

    Filesize

    9.6MB