Analysis

  • max time kernel
    23s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 09:25

General

  • Target

    airobuxgen.ps1

  • Size

    2KB

  • MD5

    3991073564f05900f8dcf9ea6d65893d

  • SHA1

    18e1d0109180a84dad717943262b38c0d827a009

  • SHA256

    f02820869fb4768c2e5e04f85168bde9222b11c3c575118296be5dfd6af07b3a

  • SHA512

    f1341a552b9d72d150a34e15ee278dcc107e4aedc4773728b26cf0f0406cef51d823e7443d3ae2cd8bf4ecadfc1c18ebb00b6aa0d2f6a872022f9654a6d0dd3f

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\airobuxgen.ps1
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\system32\netsh.exe
      "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:2536
    • C:\Windows\system32\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /create /tn MaliciousTask /tr C:\Windows\System32\malware.bat /sc onlogon /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3004
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c ping localhost -n 5 >nul & echo Injecting into process
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\system32\PING.EXE
        ping localhost -n 5
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3060
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
    1⤵
      PID:1304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2552-4-0x000007FEF5C9E000-0x000007FEF5C9F000-memory.dmp

      Filesize

      4KB

    • memory/2552-5-0x000000001B770000-0x000000001BA52000-memory.dmp

      Filesize

      2.9MB

    • memory/2552-6-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

      Filesize

      32KB

    • memory/2552-7-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp

      Filesize

      9.6MB

    • memory/2552-9-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp

      Filesize

      9.6MB

    • memory/2552-10-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp

      Filesize

      9.6MB

    • memory/2552-8-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp

      Filesize

      9.6MB

    • memory/2552-11-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp

      Filesize

      9.6MB

    • memory/2552-13-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp

      Filesize

      9.6MB

    • memory/2552-14-0x000007FEF5C9E000-0x000007FEF5C9F000-memory.dmp

      Filesize

      4KB