Analysis
-
max time kernel
140s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601.ps1
Resource
win10v2004-20240802-en
General
-
Target
ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601.ps1
-
Size
890B
-
MD5
1c7c87418b7e6d0bee5d1c16943a23d0
-
SHA1
29359f7aa72e1111c3e452005b10ca8a83541fc3
-
SHA256
ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601
-
SHA512
2102772cfe2ffab5e53d428c4e80f53391b1b9d62a3cdce94c8a1aac026d6feba7a72e75d6e22eec482546fd60e57f1074d2796839a2e5946c9d998bc0352688
Malware Config
Signatures
-
pid Process 2520 powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4312 2520 powershell.exe 85 PID 2520 wrote to memory of 4312 2520 powershell.exe 85 PID 4312 wrote to memory of 2304 4312 csc.exe 88 PID 4312 wrote to memory of 2304 4312 csc.exe 88
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lsespu3u\lsespu3u.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA41F.tmp" "c:\Users\Admin\AppData\Local\Temp\lsespu3u\CSC7B381C6780D5458D95485D16A25D3A5F.TMP"3⤵PID:2304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ef8d125ee472b3f838851ec53b71f51e
SHA131393e18fc78b39b594fa60cd056827d277d8c54
SHA25625d160f7c1b6f043ffc82da56551eddbe3ff42acfebcc024cc3b07a0d8bc42c2
SHA512791df710361a014532e54e5d789a474e34b9e45fc8095e23668d3d6cbc439e126633a094815eb60417e21a1a304380e1b5347f6df88af0e8f72a46da6aac2e41
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5abdab95fd41736641080147422f04ec6
SHA1c97ae51eb0b94da1669e6125f76a01e225e4999d
SHA256a8a4b4ea8649492807845e37f906680e282047e2c8b2e12d83ce8fbb2465510e
SHA512ddef8ea7961b4a0e7625793ead9c4248c6eb5f8da744eb700f91fe7f4d6c86702b5a4a99093bc40c0561c00615b76de9ff4c7959bd56dc86c52297f25e722137
-
Filesize
652B
MD566139151b2f734d81469b6cca405769e
SHA1a8c21c98dd0160417b4e5d8f0ed53802b30dbde0
SHA25651a70f4fbd3d9185025e32ae2b4a0ec7e86238775ef804233b6b8a0587b89312
SHA5124fc09cecb4c844a66a71cab81cca912cdddb9235238b28e25cd8eadea4008e801386660ff9c39d1021703585d23abefe7eeb3902bbcf5787822be8f875ed53b1
-
Filesize
296B
MD5192212fd8703f800c49ba96f01932522
SHA1f24764777b0a1c4b963e6035b9b5846a314192f7
SHA256319af060598b22fcea608f61ef06539a09578b4aa8caf3dfd1f5619a3d9f33cc
SHA512c0f853c23741a58e388e0744c1df8df2be4d72719528c7bee61d52744cd0ed11c2c25ba4bf8e7438305e7b19bc0ef6c094d84bad8060955ec3cf21212244d5a9
-
Filesize
369B
MD582ffc2834c3dc5c3b453349076c7b4a2
SHA151080e3af59f1f50269f1ecbbf55395627b2400a
SHA2563fc606ad60df008dd00693f95b802dd18f96bc67958b888d029e6f0480abf5a0
SHA5126e0ca78ad579b71b2d09ea897f67e2543f2499db6a38cd7853770d75de4d164896789dc2a8d6f3b8dc800b767e43bd9b3e72322dd1b2ab167585c0b9325bb2b0