Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 20:41
Behavioral task
behavioral1
Sample
0a79157ced6caf940a852fa5163f2e09.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a79157ced6caf940a852fa5163f2e09.ps1
Resource
win10v2004-20240426-en
General
-
Target
0a79157ced6caf940a852fa5163f2e09.ps1
-
Size
2KB
-
MD5
0a79157ced6caf940a852fa5163f2e09
-
SHA1
e4e2145e4dabe073e3437425c5eafc098c9cf3fd
-
SHA256
9fcf01850aba30ee520be8691bd97d9ae58b36ba689fcaace2cc218bb15f54ed
-
SHA512
0494f068a268671b2c71ea7d3321e1c7715b2781fcea79d9dbbdac0b2c0817c049806c270642e99a7ba666392a22e391d48281957e5f1551fe68dc175392e65e
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 3496 powershell.exe 3496 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3496 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.execsc.exedescription pid process target process PID 3496 wrote to memory of 1888 3496 powershell.exe csc.exe PID 3496 wrote to memory of 1888 3496 powershell.exe csc.exe PID 1888 wrote to memory of 2432 1888 csc.exe cvtres.exe PID 1888 wrote to memory of 2432 1888 csc.exe cvtres.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0a79157ced6caf940a852fa5163f2e09.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2ki4azlc\2ki4azlc.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C2E.tmp" "c:\Users\Admin\AppData\Local\Temp\2ki4azlc\CSC6CD576748E29434DAA4FEBD8DA44C323.TMP"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2ki4azlc\2ki4azlc.dllFilesize
3KB
MD5dca588d246592eea515eb17790b0b3b6
SHA1ba13c99936bf363b38723a406c098fec8f3460b5
SHA256d89f0e88521fac502fb187eb8ced7c142937a8874380307554dad37d030b945d
SHA5129568f2430743dfab3b8bc44093fb5d504d3c438658afa9a25ff549c5c387ecdd854c5f9e9c899a216fb7e8b9df7bc0b48b75b3e19126e9640d22befdf6dcaffe
-
C:\Users\Admin\AppData\Local\Temp\RES3C2E.tmpFilesize
1KB
MD54121b153ac68ecc6cc48510323e816ef
SHA106ec5b29e02a46c1d9893fb545d1cf70b9fd56f4
SHA2569624f4f267f785707dd151f80e23cdd5c1ef37eea0b153bde0336c5fc2bc0541
SHA512c61168820ac8642f1eef1302c9dde7bf883db9cac2e139dc83036eaae50a0b88e2287bbf28bab63bd206565ef3c92cb5abe04ad9eac7acf004a79774587752be
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5gib0qx3.mgh.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
\??\c:\Users\Admin\AppData\Local\Temp\2ki4azlc\2ki4azlc.0.csFilesize
557B
MD57319070c34daa5f6f2ece2dfc07119ee
SHA1f26a4a48518a5608e93c8b77368f588b0433973c
SHA256b240a9bb4f72d886522e19fa40b9c688fa94c1bd6dc7b7185f94e4466273a5dc
SHA51234169fc9fb0cd2381c45efcd22ec1bc659ef513e73bc4c7bcb91ca1d5129a1a149e9f75297acb4958e52ff04d75e6e121232dbc0657611e41b63f10aa3e1d6bd
-
\??\c:\Users\Admin\AppData\Local\Temp\2ki4azlc\2ki4azlc.cmdlineFilesize
369B
MD59a7ba869b958b2b5603a940b49a0c5f5
SHA1de55c660c073f04a8f5e8fe82e9a4c1a0d9f6c39
SHA2567ba01fbec21e18f24aa8d6623ab40985233bddc5fc94855f6826ff51f450818e
SHA512fba081f463cd035df8635f9ad4c809e99db50e05e1bc261479373f1bf7ed5720a366741f02f2ff2052b74a09a5f204b034817434de2891d6cae975d98410baa6
-
\??\c:\Users\Admin\AppData\Local\Temp\2ki4azlc\CSC6CD576748E29434DAA4FEBD8DA44C323.TMPFilesize
652B
MD56abd745675079cd87990984dfdb37424
SHA157c5dbb747c7ec4b6f5f1c205d960a888aa4aad5
SHA256878d5d732615e575da82db6ca8728fc57312ff4452699a7d19c89f3791a49d7b
SHA51266810e2c268166fcc792449aad7156658b050c1c87720bc5f048dab1565e1228cc24ed6ac434f0975c55987bd40debdbb1081ff1cd2ee576037b170dec49e38a
-
memory/3496-11-0x00007FFA50440000-0x00007FFA50F01000-memory.dmpFilesize
10.8MB
-
memory/3496-13-0x00007FFA50440000-0x00007FFA50F01000-memory.dmpFilesize
10.8MB
-
memory/3496-12-0x00007FFA50440000-0x00007FFA50F01000-memory.dmpFilesize
10.8MB
-
memory/3496-26-0x0000019F001A0000-0x0000019F001A8000-memory.dmpFilesize
32KB
-
memory/3496-0-0x00007FFA50443000-0x00007FFA50445000-memory.dmpFilesize
8KB
-
memory/3496-6-0x0000019F7E3A0000-0x0000019F7E3C2000-memory.dmpFilesize
136KB
-
memory/3496-28-0x0000019F186F0000-0x0000019F186F1000-memory.dmpFilesize
4KB
-
memory/3496-29-0x00007FFA50440000-0x00007FFA50F01000-memory.dmpFilesize
10.8MB