Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
2.ps1
Resource
win7-20240705-en
General
-
Target
2.ps1
-
Size
1002KB
-
MD5
53c4c7466cebb3357a4bf5fdde6e03bd
-
SHA1
3ae57e66c6651b2c35b873db5de86b87ccc969ad
-
SHA256
ec7d6975587d8dd4effb5727882b1fbb867766d4df73ec304c88d27362ce6ace
-
SHA512
aa7a49bde2e30748853b66c772d5bc72372699d52a0d4806d373e870eaa0488ba6ff7b92669e15c9b0180f4cfebd45e698a75b514512b6eddb338dfaf2d2a75e
-
SSDEEP
24576:TawjBUo3v/AOhx415r2X0Kin4clpSeuoZ+tF0USjpMmaXBxwP0oOGAlLRqkbx2yY:e
Malware Config
Signatures
-
pid Process 2780 powershell.exe 1280 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2780 powershell.exe 1280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 1280 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1036 1820 taskeng.exe 33 PID 1820 wrote to memory of 1036 1820 taskeng.exe 33 PID 1820 wrote to memory of 1036 1820 taskeng.exe 33 PID 1036 wrote to memory of 2556 1036 WScript.exe 34 PID 1036 wrote to memory of 2556 1036 WScript.exe 34 PID 1036 wrote to memory of 2556 1036 WScript.exe 34 PID 2556 wrote to memory of 1280 2556 cmd.exe 36 PID 2556 wrote to memory of 1280 2556 cmd.exe 36 PID 2556 wrote to memory of 1280 2556 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\2.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
C:\Windows\system32\taskeng.exetaskeng.exe {7785D090-ED45-438F-8CFD-6CA806C7D389} S-1-5-21-3502430532-24693940-2469786940-1000:PSBQWFYT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\wingro8.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Public\wingro8.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\wingro8.ps1'"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5937e050be687f9a1e0bdbaacf6d56f2e
SHA11383c504a925e0fc9cd6c42eae7d76eb58ae7c73
SHA2561f737b83165a8fab9b3da8c2bfb2da757210c789e32e5e45a1776006a76ecf32
SHA512904d8939c27f7b8667e14c2f35cc55ca104fdd1cdaea17d3e6630198fe89a6bc217d4a003c3013905717d8765149070c352c46974e947cd29ca2ca33e33da6c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K85XBX0P0VO3I3A8GQ38.temp
Filesize7KB
MD5d329c6aa1a5b9fb614224d6314fb4da7
SHA14f6520ae47aad6c66f8f18ba9d4a862a457fe139
SHA2565ea7cb879a0e5fb9115a775b5d23991eec5baf93ca3510e62817039395e0d689
SHA512c78557929f32dc390664a48ad5b6fe03a8a5e71dd44a646de158f2b9ab3bfccfeede9f3b5b5ed57519d52dcc4b2086f2672eb9e3eb069bcacfbcc43e53fe5f4f
-
Filesize
204B
MD59ae3fd9aa024c8c635043f25e14e4582
SHA1346bdf6d3fb90733b29e4b0679eed419d2337d8a
SHA25608eb7706a9e1efa8a68e0174bc5d62fd48282ffafc561819c3bc87784a80e73f
SHA512b4a87e683517cdfc1df43a08b238844bac0319be234ccfddb1ba0c55bc321d5f3b592a7ecd795370d735c629ff2122d9a6405c181a16128606ba4b26c1f67af2
-
Filesize
1000KB
MD5a7c519fa08aa6c0e88292f403244958d
SHA166aa43c3d645041957e7da8ad263c6c8ac21875f
SHA2566b69b5238db51c77517e5ad018160b9d1be9b9d6af217033b4cf0648e4dfe1fd
SHA512f621dc60aed94d8571a75b9f3ef83831de09fa1baebd21e12d476c67315745b6974bd76c163c623ee765f7e181da4291aa298574397782020e0b4585911fb1bd
-
Filesize
689B
MD5aeee1749af12130d3f8c69f286d82904
SHA11199175f300c2249c1e6fedb28efa44acffa88b1
SHA25640dd27ce5d1b906557495317c0c0164cce12baab5dae79028b1539a65a9caf2b
SHA512f8e944b7de50ef6200606f334b82216ea177bea391b3464bacda0db44395a346994cdb26f1bba4c83e6044f88b76cad87d89179ced0ea09114d15aeab49fffec