Malware Analysis Report

2024-10-10 07:25

Sample ID 240611-paay5swdqa
Target target.ps1
SHA256 7fe3aa9568ab4eba3f002de4d9f9c74e032c726ff389a1e8bce14f728ab13ffb
Tags
execution
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

7fe3aa9568ab4eba3f002de4d9f9c74e032c726ff389a1e8bce14f728ab13ffb

Threat Level: Likely benign

The file target.ps1 was found to be: Likely benign.

Malicious Activity Summary

execution

Command and Scripting Interpreter: PowerShell

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-11 12:07

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 12:07

Reported

2024-06-11 12:13

Platform

win7-20240419-en

Max time kernel

316s

Max time network

316s

Command Line

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\target.ps1

Signatures

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\target.ps1

Network

N/A

Files

memory/288-4-0x000007FEF658E000-0x000007FEF658F000-memory.dmp

memory/288-5-0x000000001B4E0000-0x000000001B7C2000-memory.dmp

memory/288-7-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

memory/288-6-0x00000000028A0000-0x00000000028A8000-memory.dmp

memory/288-8-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

memory/288-11-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

memory/288-10-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

memory/288-9-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

memory/288-12-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-11 12:07

Reported

2024-06-11 12:07

Platform

android-x86-arm-20240603-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-11 12:07

Reported

2024-06-11 12:07

Platform

android-x64-20240603-en

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-11 12:07

Reported

2024-06-11 12:07

Platform

android-x64-arm64-20240611-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 216.58.204.78:443 tcp
GB 216.58.204.78:443 tcp
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-11 12:07

Reported

2024-06-11 12:16

Platform

macos-20240410-en

Max time kernel

320s

Max time network

391s

Command Line

[sh -c sudo /bin/zsh -c "/Users/run/target.ps1"]

Signatures

N/A

Processes

/bin/sh

[sh -c sudo /bin/zsh -c "/Users/run/target.ps1"]

/bin/bash

[sh -c sudo /bin/zsh -c "/Users/run/target.ps1"]

/usr/bin/sudo

[sudo /bin/zsh -c /Users/run/target.ps1]

/bin/zsh

[/bin/zsh -c /Users/run/target.ps1]

/Users/run/target.ps1

[/Users/run/target.ps1]

/bin/sh

[sh /Users/run/target.ps1]

/bin/bash

[sh /Users/run/target.ps1]

/usr/bin/pluginkit

[/usr/bin/pluginkit -e ignore -i com.microsoft.OneDrive.FinderSync]

/usr/sbin/spctl

[/usr/sbin/spctl --assess --type execute /var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/T/OneDriveUpdaterB516C108/OneDrive.app]

/usr/libexec/xpcproxy

[xpcproxy com.apple.sysmond]

/usr/libexec/sysmond

[/usr/libexec/sysmond]

/usr/libexec/xpcproxy

[xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E]

/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService

[/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService]

Network

Country Destination Domain Proto
US 8.8.8.8:53 mobile.events.data.trafficmanager.net udp
US 20.189.173.23:443 tcp
US 8.8.8.8:53 api.apple-cloudkit.fe2.apple-dns.net udp
US 8.8.8.8:53 apis.apple.map.fastly.net udp
US 8.8.8.8:53 cds.apple.com udp
US 8.8.8.8:53 help.apple.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 apis.apple.map.fastly.net udp
US 8.8.8.8:53 lb._dns-sd._udp.0.0.127.10.in-addr.arpa udp

Files

N/A