Analysis Overview
SHA256
8fa77a5d324e475122b5d41cbec41632fcc5176765cee9e44beb94b65d95a3cb
Threat Level: Likely benign
The file trigger.ps1 was found to be: Likely benign.
Malicious Activity Summary
Drops file in Windows directory
Command and Scripting Interpreter: PowerShell
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-13 04:33
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 04:33
Reported
2024-06-13 04:36
Platform
win11-20240611-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\Panther\UnattendGC\setupact.log | C:\Windows\System32\oobe\UserOOBEBroker.exe | N/A |
| File opened for modification | C:\Windows\Panther\UnattendGC\setuperr.log | C:\Windows\System32\oobe\UserOOBEBroker.exe | N/A |
| File opened for modification | C:\Windows\Panther\UnattendGC\diagerr.xml | C:\Windows\System32\oobe\UserOOBEBroker.exe | N/A |
| File opened for modification | C:\Windows\Panther\UnattendGC\diagwrn.xml | C:\Windows\System32\oobe\UserOOBEBroker.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe | N/A |
| N/A | N/A | C:\Windows\System32\osk.exe | N/A |
| N/A | N/A | C:\Windows\System32\osk.exe | N/A |
| N/A | N/A | C:\Windows\System32\osk.exe | N/A |
| N/A | N/A | C:\Windows\System32\osk.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1428 wrote to memory of 2664 | N/A | C:\Windows\System32\ATBroker.exe | C:\Windows\System32\osk.exe |
| PID 1428 wrote to memory of 2664 | N/A | C:\Windows\System32\ATBroker.exe | C:\Windows\System32\osk.exe |
Processes
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\trigger.ps1
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
C:\Windows\System32\oobe\UserOOBEBroker.exe
C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
C:\Windows\System32\ATBroker.exe
C:\Windows\System32\ATBroker.exe /start osk
C:\Windows\System32\osk.exe
"C:\Windows\System32\osk.exe"
Network
| Country | Destination | Domain | Proto |
| GB | 95.101.129.225:443 | tcp | |
| NL | 23.62.61.97:443 | r.bing.com | tcp |
| NL | 23.62.61.97:443 | r.bing.com | tcp |
| NL | 23.62.61.97:443 | r.bing.com | tcp |
| NL | 23.62.61.97:443 | r.bing.com | tcp |
| NL | 23.62.61.97:443 | r.bing.com | tcp |
| NL | 23.62.61.97:443 | r.bing.com | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| BE | 104.68.66.114:443 | cxcs.microsoft.net | tcp |
| BE | 2.17.107.112:443 | www.bing.com | tcp |
| US | 13.107.136.254:443 | spo-ring.msedge.net | tcp |
| US | 13.107.253.254:443 | t-ring-fallback.msedge.net | tcp |
| US | 152.199.19.161:443 | fp-vp-nocache.azureedge.net | tcp |
| DE | 51.116.253.169:443 | browser.pipe.aria.microsoft.com | tcp |
| US | 13.107.3.254:443 | s-ring.msedge.net | tcp |
| US | 150.171.69.254:443 | mcr-ring.msedge.net | tcp |
| FR | 152.199.21.118:443 | static-ecst.licdn.com | tcp |
| BE | 2.17.107.105:443 | www.bing.com | tcp |
| BE | 104.68.66.114:443 | cxcs.microsoft.net | tcp |
| US | 131.253.33.254:443 | a-ring-fallback.msedge.net | tcp |
Files
memory/2288-0-0x00007FFB5D213000-0x00007FFB5D215000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pqy3cebd.eru.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/2288-1-0x0000019251510000-0x0000019251532000-memory.dmp
memory/2288-10-0x00007FFB5D210000-0x00007FFB5DCD2000-memory.dmp
memory/2288-11-0x00007FFB5D210000-0x00007FFB5DCD2000-memory.dmp
memory/2288-12-0x00007FFB5D210000-0x00007FFB5DCD2000-memory.dmp
memory/2288-16-0x00007FFB5D210000-0x00007FFB5DCD2000-memory.dmp
memory/2288-15-0x00007FFB5D210000-0x00007FFB5DCD2000-memory.dmp
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
| MD5 | 9a7af7f1f08f7de9da3ba647286ee5a6 |
| SHA1 | d7a23961ba5f8c4242a03f20686ff516c2ae432c |
| SHA256 | dddc3d322b46ec53927c26326a4f4d573dec131fbe668450f984c91c3104a08b |
| SHA512 | 64b0d94e68aa2d0ee9d02f170de6989f5255c5c57d05dffbf4dbbe012dae43a6f4dbd59c6a85fd2621fb84ae7f4cdf486a089b90e3e6c4fce1b152ba5aa6ba58 |