Analysis

  • max time kernel
    189s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-05-2024 00:38

General

  • Target

    program.exe

  • Size

    34.0MB

  • MD5

    873a4c98c0aaf59965af1da242d1d0cd

  • SHA1

    b67bad68d8bb2e2748a5662c4496a5544112719c

  • SHA256

    c2df0ea1cdff5a9325d55ed381e87a7187483406874d93c7abeeac1b68b0a38e

  • SHA512

    a6d9b85c9af24b658b745ff9006c73e54d647618dcb4268ad2cce192349058080d6e1ffed8798a405946ef3e47eb11e59d7ebb5941d6f9c4e33f505b1856c5d6

  • SSDEEP

    393216:PXXujqPZS1K0OrveP+SzR+JP9CHrpEaXO/7Dn1J:PXe6ZSAWlz29URKH

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\program.exe
    "C:\Users\Admin\AppData\Local\Temp\program.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -WindowStyle Hidden
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:784
    • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
      "PowerShell" Expand-Archive -Path C:\Users\Admin\AppData\Local\Temp\jd6QbIew0WJHmTFtTy3N.zip -DestinationPath C:\Users\Admin\AppData\Local\Temp\jd6QbIew0WJHmTFtTy3N
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2236
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Start-Process -FilePath C:\Users\Admin\AppData\Local\Temp\jd6QbIew0WJHmTFtTy3N\launcher.exe -WindowStyle Hidden
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5068
    • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
      "PowerShell" Expand-Archive -Path C:\Users\Admin\AppData\Local\Temp\viYmOKcAPkjm5dtQx8JP.zip -DestinationPath C:\Users\Admin\AppData\Local\Temp\viYmOKcAPkjm5dtQx8JP
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1560
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Start-Process -FilePath C:\Users\Admin\AppData\Local\Temp\viYmOKcAPkjm5dtQx8JP\system.exe -WindowStyle Hidden
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    94855049590df2a11123e4b4dfb202a0

    SHA1

    60934db6289c32668291284f4024608874fc4901

    SHA256

    6a050ffa045a5aa2214f5452b3a580e33c0d488eeec2cffd76cf5a656ede0e2a

    SHA512

    7c6e93423e2fab8e3536add6b3d5df552541afbb0a95d6fb8f1c5f4f7882ea549a84ef00cd66f4c5765bdb80d36749db165e64456d8059e1c7368185d6b5579e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    50KB

    MD5

    2143b379fed61ab5450bab1a751798ce

    SHA1

    32f5b4e8d1387688ee5dec6b3cc6fd27b454f19e

    SHA256

    a2c739624812ada0913f2fbfe13228e7e42a20efdcb6d5c4e111964f9b620f81

    SHA512

    0bc39e3b666fdad76bcf4fe7e7729c9e8441aa2808173efc8030ce07c753cb5f7e25d81dd8ec75e7a5b6324b7504ff461e470023551976a2a6a415d6a4859bfa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    ae6b60a32a94adfb9b57b5cde9c949c1

    SHA1

    5addc52cfa0ab4db8fa32a0ed9a35e31b426c827

    SHA256

    d457a1d34e657bb8bf390e232fcb04d60b8497d9589ea83913b128fd03f30872

    SHA512

    5d03165f45fae11ab37cac3292f701423c327d81941952cfc316ad8157ee3205f0134215e6a60844ff3b8ebaa74f531a4234c7a2f4010cd6fb362f7e5f8e7455

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    fffab9e73a1877af6e9b294570d9b664

    SHA1

    232aacab959d46f46b5b382448d7d80286cc05d5

    SHA256

    0f5c89a31150e9c18c7d6f8a630a2f83870e51bed58e96d64b49dd9bf1a3ead3

    SHA512

    54def724f13bd8a0ee97378af99ed5bf2c3dd864c28f6db400549b3bd6fac72e699defba64e454e4264a13b767ddee78c168807c462dd53218755099fa56518d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tck2djph.kxj.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\jd6QbIew0WJHmTFtTy3N.zip

    Filesize

    1KB

    MD5

    2eead490d2b4ac4fc7d3e1f3ef098bd9

    SHA1

    bf5e8df8907a70b336e55ccd7d7b336ce8d74709

    SHA256

    6f26cdfdedbf7016866c60da5f71a36432c7bc9fefc38de794ef1dbf3d773023

    SHA512

    b608c653d4fcd8c185ed1a97620bed89c9b2e5d6a219d3c9f9e6407bd820b86759e4a2e9b00c59f1724581d2a8eb7a7ef22b176ab030397e8ec0a8ba747e2a45

  • C:\Users\Admin\AppData\Local\Temp\viYmOKcAPkjm5dtQx8JP.zip

    Filesize

    896B

    MD5

    de16f382443862e699d84e8cf7665d7e

    SHA1

    7d6d938da4ea8d5b8df6feea9207b8eaea94604f

    SHA256

    1897914a976417db74e44c68f812cb4b92869896ed79eeac27e50d89f1eba4d1

    SHA512

    6f09eb8b4e5a8b83c54a74cad89a5c984fecb43fbd7606e245370abb7e1d0aeb57dd00a016442d5cd8dafa673b658a38ce6b58beb527a40063913a9ff406d1ea

  • memory/784-35-0x00000178CC230000-0x00000178CC26C000-memory.dmp

    Filesize

    240KB

  • memory/784-58-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

    Filesize

    1.9MB

  • memory/784-7-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

    Filesize

    1.9MB

  • memory/784-6-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

    Filesize

    1.9MB

  • memory/784-46-0x00000178CC780000-0x00000178CC7F6000-memory.dmp

    Filesize

    472KB

  • memory/784-4-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

    Filesize

    1.9MB

  • memory/784-8-0x00000178CC0A0000-0x00000178CC0C2000-memory.dmp

    Filesize

    136KB

  • memory/2236-101-0x000001F65AC20000-0x000001F65AC32000-memory.dmp

    Filesize

    72KB

  • memory/2236-114-0x000001F65AC00000-0x000001F65AC0A000-memory.dmp

    Filesize

    40KB