Overview
overview
8Static
static
1MiyLdAnAfs.zip
windows10-2004-x64
1AfUGUvQSqtO.txt
windows10-2004-x64
1BKUAFSbXul.ps1
windows10-2004-x64
3BZoBydVPNRD.txt
windows10-2004-x64
1HNjSwHsOPTv.txt
windows10-2004-x64
1KWOOIpjtEEF.txt
windows10-2004-x64
1RDXService.vbs
windows10-2004-x64
3RIFbNWmjbN.ps1
windows10-2004-x64
3TetheringStation.bat
windows10-2004-x64
8TpmCorePro...ng.ps1
windows10-2004-x64
3dasSjlZizst.txt
windows10-2004-x64
1iDKJayCPUyw.txt
windows10-2004-x64
1oKAtZfClKJ.ps1
windows10-2004-x64
3qeJpItFdUJDWWYvDg.txt
windows10-2004-x64
1rdrleakdiag.bat
windows10-2004-x64
8remoteaudi...nt.ps1
windows10-2004-x64
3secproc_ssp_isv.vbs
windows10-2004-x64
3ugseiAHvLNJ.txt
windows10-2004-x64
1wAXlNpmmKaGhvRUpl.txt
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
MiyLdAnAfs.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
AfUGUvQSqtO.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BKUAFSbXul.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
BZoBydVPNRD.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
HNjSwHsOPTv.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
KWOOIpjtEEF.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RDXService.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
RIFbNWmjbN.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
TetheringStation.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
TpmCoreProvisioning.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
dasSjlZizst.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
iDKJayCPUyw.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
oKAtZfClKJ.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
qeJpItFdUJDWWYvDg.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
rdrleakdiag.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
remoteaudioendpoint.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
secproc_ssp_isv.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
ugseiAHvLNJ.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
wAXlNpmmKaGhvRUpl.txt
Resource
win10v2004-20240802-en
General
-
Target
TetheringStation.bat
-
Size
1KB
-
MD5
6e6f8948c420c9820670f1c8f5cd188f
-
SHA1
a9aadf5a4c5e8d556001988a3dbecceb71db8c09
-
SHA256
e948a7e99c72e1278b94003cce9ea0e4a0594c537b64a127f860f194680de92f
-
SHA512
08c397eb190badbba650fef2b58b7dc459e2ef8f76089dff5a4760627a2814a2e58478248632701872b3cbbf10d285f1f7f2c52b5c881c5140e27725a376d232
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3412 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3412 powershell.exe 3412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3412 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3412 3508 cmd.exe 92 PID 3508 wrote to memory of 3412 3508 cmd.exe 92
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\TetheringStation.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\Bodycam\TpmCoreProvisioning.ps1'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3908,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:81⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82