Analysis

  • max time kernel
    318s
  • max time network
    301s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 10:13

Errors

Reason
Machine shutdown

General

  • Target

    file.ps1

  • Size

    1B

  • MD5

    7215ee9c7d9dc229d2921a40e899ec5f

  • SHA1

    b858cb282617fb0956d960215c8e84d1ccf909c6

  • SHA256

    36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068

  • SHA512

    f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\file.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4292
  • C:\Windows\System32\BitLockerWizardElev.exe
    "C:\Windows\System32\BitLockerWizardElev.exe" C:\ T
    1⤵
      PID:4184
    • C:\Windows\system32\SystemSettingsAdminFlows.exe
      "C:\Windows\system32\SystemSettingsAdminFlows.exe" TurnOffDevicePortal
      1⤵
        PID:4924
      • C:\Windows\system32\SystemSettingsAdminFlows.exe
        "C:\Windows\system32\SystemSettingsAdminFlows.exe" TurnOffDevicePortal
        1⤵
          PID:5064
        • C:\Windows\system32\SystemSettingsAdminFlows.exe
          "C:\Windows\system32\SystemSettingsAdminFlows.exe" TurnOnDeveloperFeatures DeveloperUnlock
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:3640
        • C:\Windows\System32\FodHelper.exe
          C:\Windows\System32\FodHelper.exe -Embedding
          1⤵
            PID:780
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa3936055 /state1:0x41c64e6d
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:3664
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
            1⤵
              PID:4952
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1684
            • C:\Windows\system32\bootim.exe
              bootim.exe /startpage:1
              1⤵
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:4320

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Execution

            Command and Scripting Interpreter

            1
            T1059

            PowerShell

            1
            T1059.001

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2b4utqgd.umq.ps1
              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Windows\System32\Recovery\ReAgent.xml
              Filesize

              1KB

              MD5

              3e9e6664250d6b8b7e3a91f502536b04

              SHA1

              3dd49f7f3661f4cd4a5a92917685c224f886cbe3

              SHA256

              dbe63a5ddb28ab6a191c83408063eef409b50da5b14bccc515f37d5d0f7877ba

              SHA512

              293c345d4ccfad336a26020b66ba2653331d78489d94bb898c29fefb6c2653622fc6463a33c07e976f10e268cf4a638efa9941bb0784feeab4ad57bda57e3e88

            • memory/4292-0-0x00007FFBED9F3000-0x00007FFBED9F5000-memory.dmp
              Filesize

              8KB

            • memory/4292-6-0x00000218CA910000-0x00000218CA932000-memory.dmp
              Filesize

              136KB

            • memory/4292-11-0x00007FFBED9F0000-0x00007FFBEE4B1000-memory.dmp
              Filesize

              10.8MB

            • memory/4292-12-0x00007FFBED9F0000-0x00007FFBEE4B1000-memory.dmp
              Filesize

              10.8MB

            • memory/4292-15-0x00007FFBED9F0000-0x00007FFBEE4B1000-memory.dmp
              Filesize

              10.8MB