Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-07-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
target.ps1
Resource
win11-20240709-en
General
-
Target
target.ps1
-
Size
180B
-
MD5
79bb5fa218fb3e4e2919f761729659ca
-
SHA1
2446cbdfc6f76efb693db3de3c73b3c8e5e224c9
-
SHA256
d6d50a50d2e0c179fc39fc2b3ac395100fee7f64269e5f233d8861476b59dd53
-
SHA512
21fc584934ded63374e4a284f722ec17c8734a83b3f496b6bd39a574778bb2b2b9499d88910eeb29140abb9ec9d524a6752bf2639e56367ca8f45b925b31f955
Malware Config
Signatures
-
pid Process 3532 powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3171217504-1685128607-2237314850-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3532 powershell.exe 3532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3532 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4024 MiniSearchHost.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\target.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2924
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD5fa818effcde20598c3b9ec9eebc345dc
SHA1a26401fd9c0b51b32e036e18f3b6ae3a14240227
SHA256065e354a76c8f6f6db86558fe1376dd6bd479104bd75f95b4022b2be16fc69ec
SHA512df9686a22117e1f1c8fdcc29526fe7301323a37afcd67dd83d3183546bf02849cade68f5af8eef59f415f00076d890b1f5055b94ea96ce395d416499644d0943
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD58020758ff3cf639a521875cc245bfd0e
SHA1bfc0166e6af458547b4244508d43a220efa5a3fe
SHA25624f730d417a70787fc39eb336d653986ca69dec5c89f58f8f6806c0e91fcc8b8
SHA5129ae95be01a567917738cef3a26d13f364550db72718f0ce6e7a46309428ba31182cac353bf8aab1cdcf3fe200cea334a7d6ce4a06e8ff99fa182db9ddca090b1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82