Analysis

  • max time kernel
    140s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 21:34

General

  • Target

    ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601.ps1

  • Size

    890B

  • MD5

    1c7c87418b7e6d0bee5d1c16943a23d0

  • SHA1

    29359f7aa72e1111c3e452005b10ca8a83541fc3

  • SHA256

    ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601

  • SHA512

    2102772cfe2ffab5e53d428c4e80f53391b1b9d62a3cdce94c8a1aac026d6feba7a72e75d6e22eec482546fd60e57f1074d2796839a2e5946c9d998bc0352688

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ed35aa3d4d18222087c8937f99d970d96200d5991ca93eb752cf83ccb1366601.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lsespu3u\lsespu3u.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4312
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA41F.tmp" "c:\Users\Admin\AppData\Local\Temp\lsespu3u\CSC7B381C6780D5458D95485D16A25D3A5F.TMP"
        3⤵
          PID:2304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESA41F.tmp

      Filesize

      1KB

      MD5

      ef8d125ee472b3f838851ec53b71f51e

      SHA1

      31393e18fc78b39b594fa60cd056827d277d8c54

      SHA256

      25d160f7c1b6f043ffc82da56551eddbe3ff42acfebcc024cc3b07a0d8bc42c2

      SHA512

      791df710361a014532e54e5d789a474e34b9e45fc8095e23668d3d6cbc439e126633a094815eb60417e21a1a304380e1b5347f6df88af0e8f72a46da6aac2e41

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ahbndwiw.hqk.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\lsespu3u\lsespu3u.dll

      Filesize

      3KB

      MD5

      abdab95fd41736641080147422f04ec6

      SHA1

      c97ae51eb0b94da1669e6125f76a01e225e4999d

      SHA256

      a8a4b4ea8649492807845e37f906680e282047e2c8b2e12d83ce8fbb2465510e

      SHA512

      ddef8ea7961b4a0e7625793ead9c4248c6eb5f8da744eb700f91fe7f4d6c86702b5a4a99093bc40c0561c00615b76de9ff4c7959bd56dc86c52297f25e722137

    • \??\c:\Users\Admin\AppData\Local\Temp\lsespu3u\CSC7B381C6780D5458D95485D16A25D3A5F.TMP

      Filesize

      652B

      MD5

      66139151b2f734d81469b6cca405769e

      SHA1

      a8c21c98dd0160417b4e5d8f0ed53802b30dbde0

      SHA256

      51a70f4fbd3d9185025e32ae2b4a0ec7e86238775ef804233b6b8a0587b89312

      SHA512

      4fc09cecb4c844a66a71cab81cca912cdddb9235238b28e25cd8eadea4008e801386660ff9c39d1021703585d23abefe7eeb3902bbcf5787822be8f875ed53b1

    • \??\c:\Users\Admin\AppData\Local\Temp\lsespu3u\lsespu3u.0.cs

      Filesize

      296B

      MD5

      192212fd8703f800c49ba96f01932522

      SHA1

      f24764777b0a1c4b963e6035b9b5846a314192f7

      SHA256

      319af060598b22fcea608f61ef06539a09578b4aa8caf3dfd1f5619a3d9f33cc

      SHA512

      c0f853c23741a58e388e0744c1df8df2be4d72719528c7bee61d52744cd0ed11c2c25ba4bf8e7438305e7b19bc0ef6c094d84bad8060955ec3cf21212244d5a9

    • \??\c:\Users\Admin\AppData\Local\Temp\lsespu3u\lsespu3u.cmdline

      Filesize

      369B

      MD5

      82ffc2834c3dc5c3b453349076c7b4a2

      SHA1

      51080e3af59f1f50269f1ecbbf55395627b2400a

      SHA256

      3fc606ad60df008dd00693f95b802dd18f96bc67958b888d029e6f0480abf5a0

      SHA512

      6e0ca78ad579b71b2d09ea897f67e2543f2499db6a38cd7853770d75de4d164896789dc2a8d6f3b8dc800b767e43bd9b3e72322dd1b2ab167585c0b9325bb2b0

    • memory/2520-11-0x00007FFF10DE0000-0x00007FFF118A1000-memory.dmp

      Filesize

      10.8MB

    • memory/2520-12-0x00007FFF10DE0000-0x00007FFF118A1000-memory.dmp

      Filesize

      10.8MB

    • memory/2520-0-0x00007FFF10DE3000-0x00007FFF10DE5000-memory.dmp

      Filesize

      8KB

    • memory/2520-25-0x000001B433950000-0x000001B433958000-memory.dmp

      Filesize

      32KB

    • memory/2520-1-0x000001B433960000-0x000001B433982000-memory.dmp

      Filesize

      136KB

    • memory/2520-27-0x00007FFF10DE0000-0x00007FFF118A1000-memory.dmp

      Filesize

      10.8MB

    • memory/2520-28-0x00007FFF10DE0000-0x00007FFF118A1000-memory.dmp

      Filesize

      10.8MB

    • memory/2520-29-0x00007FFF10DE3000-0x00007FFF10DE5000-memory.dmp

      Filesize

      8KB