Analysis
-
max time kernel
129s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
14-06-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
scr1ipt.ps1
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
scr1ipt.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
scr1ipt.ps1
Resource
win11-20240611-en
General
-
Target
scr1ipt.ps1
-
Size
7KB
-
MD5
c44d7216c3cc62db69cbe60ac2e67a1c
-
SHA1
3a7aedb6c1f4d072c4656dbd49317fe5b38dcc12
-
SHA256
db1b59a6777f2d0e813317be50541ff20b72dd82711feb6f73c875e58a37343b
-
SHA512
892cc044bab84a48a953f8a46a55247c12bfb3b34774e106ae4632b3bc7e6f63ec88299c3a685d46c64f49c497a261057acc4184bf3a4d9487fd0e7d2817456d
-
SSDEEP
192:7qFeaF0diqqeaYzkIJm/5Z0dK7ZhWz7Xhbi9pdM3:79QV83YIcRZ3ZhSGQ
Malware Config
Extracted
lumma
https://secretiveonnicuw.shop/api
https://liabiliytshareodlkv.shop/api
https://notoriousdcellkw.shop/api
https://conferencefreckewl.shop/api
https://flourhishdiscovrw.shop/api
https://landdumpycolorwskfw.shop/api
https://ohfantasyproclaiwlo.shop/api
https://parallelmercywksoffw.shop/api
https://barebrilliancedkoso.shop/api
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 2840 powershell.exe 4 2840 powershell.exe 8 2840 powershell.exe 12 2840 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 3324 hv.exe 4292 hv.exe -
Loads dropped DLL 3 IoCs
pid Process 3324 hv.exe 4292 hv.exe 4852 0x21.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4292 set thread context of 4828 4292 hv.exe 74 -
pid Process 2840 powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2840 powershell.exe 2840 powershell.exe 2840 powershell.exe 3324 hv.exe 4292 hv.exe 4292 hv.exe 4828 netsh.exe 4828 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4292 hv.exe 4828 netsh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2840 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3324 hv.exe 4292 hv.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3324 2840 powershell.exe 72 PID 2840 wrote to memory of 3324 2840 powershell.exe 72 PID 2840 wrote to memory of 3324 2840 powershell.exe 72 PID 3324 wrote to memory of 4292 3324 hv.exe 73 PID 3324 wrote to memory of 4292 3324 hv.exe 73 PID 3324 wrote to memory of 4292 3324 hv.exe 73 PID 4292 wrote to memory of 4828 4292 hv.exe 74 PID 4292 wrote to memory of 4828 4292 hv.exe 74 PID 4292 wrote to memory of 4828 4292 hv.exe 74 PID 4292 wrote to memory of 4828 4292 hv.exe 74 PID 4828 wrote to memory of 4852 4828 netsh.exe 76 PID 4828 wrote to memory of 4852 4828 netsh.exe 76 PID 4828 wrote to memory of 4852 4828 netsh.exe 76 PID 4828 wrote to memory of 4852 4828 netsh.exe 76
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\scr1ipt.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\o6kdDPLX49vNLa7\hv.exe"C:\Users\Admin\AppData\Local\Temp\o6kdDPLX49vNLa7\hv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Roaming\BqDaemon\hv.exeC:\Users\Admin\AppData\Roaming\BqDaemon\hv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\0x21.pifC:\Users\Admin\AppData\Local\Temp\0x21.pif5⤵
- Loads dropped DLL
PID:4852
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5f43c6b629baaaaee1e7fe095a8821631
SHA1f0e4b84bb1fa6ba985e281f3afc9642afca168b5
SHA2564196f6776110e75a9670fb5843f373e90e88c0826ead45a30e9578221ff44ae3
SHA5122b475850705fa37dd0c1b093d31ccce48ffdbcc614215ffb304070b4f31e16ca651d4569af39b36482c848751f1e31b7fd647bd23245718a0a1e877a6417878a
-
Filesize
1.1MB
MD5dde1133a7ce646dc91f9e7e65d2ee94c
SHA12c2bd29bd039299aa23fa805ff067ff0a7efff23
SHA256151f43a8bc3e2773eb99c101d0eadf20f767f02f8d4c31ebba502dff12e4ad55
SHA51263859216f1443cffc7ec24c65d5450f8288c98af69a87af6455d21129b31c994bd1f7e1636f10764b1b75822973f276c94bab01e1e8469828c94178dc504424f
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
8.7MB
MD5480f8cf600f5509595b8418c6534caf2
SHA1dc13258ebb83bdf956523d751f67e29d6e4cf77e
SHA2566d8905ec0b1dfdc0a10d1cce40714ddd73205a09ad390b933ddbecdcf06a4cf2
SHA512f0bd99f68d59e80538fb276945d0f383394cb94a35c6d12ebd3e87061222249f78b9ca75716b33e36b66842b97c71149612111fcb6a8a3bc3a97635b03934aaf
-
Filesize
4.3MB
MD5f3f6876d132eb277842e31ddc42aa7fa
SHA19c167a2854ed106b74dff55a30bdefc55b140e9a
SHA2564ba2ddde8a4549d08bfe4441643aa626e84d7653b8ddc6ed61823e78aeb3cdf1
SHA51238b86c745945b0f97461542f89b2570210ddc3fcfeabfe2243a3b861dd80be6641e4b4181956d73926b7926d7c460db8a908ccb912c5209003ee24427aa135f9
-
Filesize
59KB
MD5674dfd74a1bef081bf0da83f893138e5
SHA12a254cc02fea4c55bbc3133b99a9e2fd03082ae7
SHA25667ff95298e395543ea0c9eeec6bfff81688df379bec578aa31c52d214b385180
SHA5120b2bfbe287a037d46d881a00638a3c272197cf3537bc74169c07c7721cda2bf94927268bfd6cb965ad56e1ac98e3466d809cbc67f2e4d971dd0d7da9568a4cce
-
Filesize
827KB
MD590b47672d8134f8cc464d83a5cde8d34
SHA169567e6a2dd5569b8cd2876a275f5d9a2ad8743f
SHA256cc38b5cb522fdf8d2fe5e85c50d72e1b8ac39d36deb157d4bffdda7970c5ba8b
SHA5127dbeb8d4a5674c088fa904a9fdcddf9cb84d41b2d2c887ba38cfcdd1ac30cf4cd8ae28bc33fc3ee51139e78645f7fb580dfaf57e939c4e144b79d507a1d1d90b