Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
ScriptBuzzBuzz 2.ps1
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ScriptBuzzBuzz 2.ps1
Resource
win10v2004-20240226-en
General
-
Target
ScriptBuzzBuzz 2.ps1
-
Size
805KB
-
MD5
4bd4a6fc1aae3870c3bb5c106a989da9
-
SHA1
8d36810464f51f919feb82895c8b20fa8f4b5630
-
SHA256
5fbdfe7519229372ef9d459b5ffdfefdc9c03578a90a84e8f729680bfa3fa228
-
SHA512
b4a9b617195daaa9e38f9a41b1fe32641c62282c01bb4eedac79fa58b31656ab5d13b05f92026d65a3e498d3d9172dff7e4efa9d6813097d0ddab2d2fb9922b8
-
SSDEEP
12288:yZbaVShXGjMH6AQg3KmgOwhS6tfbc8UdMPKBmANURqhd7myrUwdKe2G9Xu0T:yljXDnfaSoSajaMPKBRNUYTmeUbk9Xu2
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2388 powershell.exe 11 2388 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
pid Process 2388 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2388 powershell.exe 2388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe Token: SeDebugPrivilege 4120 whoami.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2388 wrote to memory of 4120 2388 powershell.exe 91 PID 2388 wrote to memory of 4120 2388 powershell.exe 91
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\ScriptBuzzBuzz 2.ps1"1⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups /fo csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
525KB
MD555ec5a1144bc961b96afa692899c7c4d
SHA18070a146a01a4881e8e8c1b1e7d1fc43bc8fbaa6
SHA2562425951c39e217be58db1839f1e1fb0449176eb7360f113d9f311a0a9dd3d3e9
SHA5124dd042bf318dd74dc2ab2b658c23d81a37ba42fece7eec27bae6e902bf4de3cf72b190b739a1208649da1fbfd1ab043430f9332c8602a81d7176cf50d3862097
-
Filesize
299KB
MD52ef81575d3d66a3906bd41f814bde12a
SHA1e5110000494ba34d4465136ebbb60386280a84b3
SHA2566afcf0553088baaf97c658020e83c0819e379651c0b81c631f9cfb7334453114
SHA5124d14c07fa6fb11d39c3446e938dc1f19c9e4f846222cc31f9cc98e7bd42ba55a7b6934d6b10295aed4256bdc5eec12918e2045172011389da528f6e63c37cec0
-
Filesize
316KB
MD5e5e933616fc062f342658fe19afaf5c5
SHA1a5fa48314bf4ca1e46c038931ca982d21e56c34c
SHA2568d95672553bb73ae73c65f08cfd71d0ebffe97d4e90302b592fbd67f0d43d187
SHA512916f6c989d3f99d3e59f425e7be010130fec78b381f2dba58131fb898c0a5f7de3ccb4da97c6806618fb32d679a6eec4f715401fa68e0af51919a12ad515b942
-
Filesize
14KB
MD52e02863beada9e4fb068869b00d0ab8d
SHA1bbbf8274a7daa6d7e1004f2b847940614ff04167
SHA256b73c40520e7c23ae3ab1bf3749c41e3ea27946d68c232dd45995874c2ad77714
SHA512f5af29c5a05922978279c42385181fad3cf57c1ffdcefd9d5840a5ad72143977c16f306f219405765262a619379fc5dcab383e48a882a7dded7a70c90d384242
-
Filesize
15KB
MD552f19585642e34073b7fe45da85dfd1e
SHA1c34eaa2ab453459ff757eada5309a30a0ba738c3
SHA2566ca5ed440cae1af141c2d72df6473c3af58065e394d7bf0cff0dbd01bddbbfdc
SHA512ce9df021e0431cfd72e86a0be772fa660d7da6d0c05fe9e6390dd4b6814c6325d23bb8cfddb694a2dc5b645debb66f555e1e76bf790a46e9ddd0bf31e859f3fa
-
Filesize
6KB
MD55a4a9b1d50eca61d72c4a263f7fbbb15
SHA1701843ac82927a78971a15e72c98e85841f5cda4
SHA256f52f3410c86d36a033b600812815f009037ccd3c9eeafff495accf0ce15eeafe
SHA51203ceaa68bd75a2d5d35e62ed71f7ec1c14066168ef0a28a710dea2083df3db9e116fbdc6e6d85eee9002ab60ef3eb560ca361b1585de680af2b4ae8e47a0f464
-
Filesize
68KB
MD5448477c359aace9d9c26ab2fc6cdb478
SHA154e7bb7026a964b5875523c041637b1d44b325a9
SHA256b68a8bed1b4e26aa50c57499a0f800ffd4230855e70efbc75e4eae54d9d25c60
SHA512b83cffbad9092c717a216eea026e70106b32e282903991d4719ffad49e30611fd07864d1922945bb767dd5b064095e27ce3ddf259f8649a0d8d9c150dfe7528b
-
Filesize
20KB
MD5a94ca05abb0f941037de7cc221bced00
SHA1af1ace1dd293c528c6d5caf7a2e3dba30802f31e
SHA2562a7d2494abbdeb86cc252766cfc1d62b73bd45106fd9a6062032d1400d437f6b
SHA5126df1912218611d4cf3ab838ce389c0d46dbd75d3b677e0adb064b0555052657e86dded7e42c6df23f0b35e5479cbaa1820b22fbba3c8d21064c4208ab14c436f
-
Filesize
176B
MD516cda74642251131d7ed88521822cf48
SHA1c4b085d09dad3ef2629f46b57cb832c408f51680
SHA256b13d8b477fab502eee564509d00d979c9f8716a1d855063c073171e684a259a0
SHA5120662b15f7d9e72e5452569648a9648f3e8da3b53a726ff6f596d26f9fa3db769d6cbad7035509467cf682ba4da14df6198ecf2c88ba5bad4ad560d6c03d2b06e
-
Filesize
354B
MD5bc9b88b2413f72d5c62fce3cdb6c002f
SHA144c5573f19bffe716e09b4dd0b685a6ff755b098
SHA256e7adbac3c2612570dc469f31f3d15494e9ecd9f5c1808f779145cea1caab13f3
SHA5121d8c66cc402468c09dfdcff6f6f1a6050a0469fb103b240440cf91eab94f19288a3a06fe480844933641d7dc36854971d7f8d7cd821f7ec1fd2313e99941c0a2
-
Filesize
73KB
MD57278b6f480d777943bba808a6952e0ab
SHA1176d1a4b447875fe61e49bbb88b214dcd1a0ab4c
SHA256ced2bccc11f3fe094c7a7e1d987e5c08abc86a57db96b60d5ae442e88da09eaa
SHA51238e1f48f854db82b82686e4d8c040cc877b8c4dedeb89bf420c4a09cf9316a958b28654031b0e407006b9fef3f3cb0a171ac6fdc0b68262b2403ffc2a2a62945