Analysis

  • max time kernel
    136s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 21:52

General

  • Target

    indexpowershell.ps1

  • Size

    914B

  • MD5

    fec80df570e3c472d9d3445376b29bbe

  • SHA1

    74209f0508d62c7fbeec2313269d1eadc3fa0601

  • SHA256

    8a36127d9fdced5a151bb5def00f508f8b132c88af5020a9bf654f468cf12cd8

  • SHA512

    453d07746ee63c33dc10efbc45beeebd046f41df965988da2f88636623c3476792a7a1f65443e82690d6be984fdfc8af3d8c854191a32d8894f158a76cbb1806

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 18 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 44 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\indexpowershell.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\system32\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\chromeremotedesktophost.msi" /quiet /norestart
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2080
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B4AD8C0875C87E2437B7CFCA65C00598
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1036
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 6E3D447F9FFC059B0CD7FE1D606F1CDF E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass New-Item -ItemType SymbolicLink -Path 'C:\Program Files (x86)\Google\Chrome Remote Desktop\CurrentVersion' -Target 'C:\Program Files (x86)\Google\Chrome Remote Desktop\125.0.6422.31\' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e59d1e0.rbs

    Filesize

    283KB

    MD5

    11e0c8cc03d483d66b2d3a4c69a774d5

    SHA1

    e39e45c1c5fc8f9ec998f60fb2f7389160ab2e86

    SHA256

    1ce53a6dd8e7e251e55a9b3cf5918c12f2be1be935283b3295ab45bad02d6669

    SHA512

    b60161069a71b14b522faa69e27a436b4d230c9426fffd6f4d8bcbbe4142f17312eb37e75231ae84399f62c4ad2f9fc5c2c6ab9123231651ce349f48f4b21d07

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2rs0rrtn.qay.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\chromeremotedesktophost.msi

    Filesize

    20.5MB

    MD5

    5f259c755b3dcbbbbc27f9513cddac61

    SHA1

    0e672bad7b67cc1f234b265f3af21976935c4903

    SHA256

    9cdd681fc86c1e816e652b0b5590d2e986b08bc26204e8048918a59c291051ce

    SHA512

    4c7f66962cecba4e753f3c996cc45bd102c6b7c6ab97bf85197091cfdb05ca82dd400f0888ead82927c61e3f45ea33e919a3a51da63cb5af1141a980f779fcb3

  • C:\Windows\Installer\MSID6BF.tmp

    Filesize

    168KB

    MD5

    a0962dd193b82c1946dc67e140ddf895

    SHA1

    7f36c38d80b7c32e750e22907ac7e1f0df76e966

    SHA256

    b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9

    SHA512

    118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751

  • C:\Windows\Installer\MSID7DA.tmp

    Filesize

    88KB

    MD5

    85fcf7b457b7194bbeb46db22fae05c3

    SHA1

    5eca64d0d4ab4599852a475a7dd25beb88ae1c27

    SHA256

    e24376a9346c2d486ce7426ca3ddc73cd020bb7216f8e5a0b9b2cb23caddcf31

    SHA512

    12d46c2d63d221adb288a89b2fe0b423d4ae7579c24c36d651a6ce9488bfdc669a1e8378309c28f7019c7cfc43fa87e99b4829cace97715c0b94ac9e2a758339

  • memory/1212-84-0x00000000062C0000-0x000000000630C000-memory.dmp

    Filesize

    304KB

  • memory/1212-83-0x00000000062A0000-0x00000000062BE000-memory.dmp

    Filesize

    120KB

  • memory/1212-88-0x0000000007A60000-0x0000000008004000-memory.dmp

    Filesize

    5.6MB

  • memory/1212-87-0x00000000067D0000-0x00000000067F2000-memory.dmp

    Filesize

    136KB

  • memory/1212-86-0x0000000006780000-0x000000000679A000-memory.dmp

    Filesize

    104KB

  • memory/1212-85-0x0000000007410000-0x00000000074A6000-memory.dmp

    Filesize

    600KB

  • memory/1212-68-0x0000000002CB0000-0x0000000002CE6000-memory.dmp

    Filesize

    216KB

  • memory/1212-69-0x00000000055D0000-0x0000000005BF8000-memory.dmp

    Filesize

    6.2MB

  • memory/1212-70-0x00000000052C0000-0x00000000052E2000-memory.dmp

    Filesize

    136KB

  • memory/1212-71-0x0000000005480000-0x00000000054E6000-memory.dmp

    Filesize

    408KB

  • memory/1212-72-0x00000000054F0000-0x0000000005556000-memory.dmp

    Filesize

    408KB

  • memory/1212-82-0x0000000005C50000-0x0000000005FA4000-memory.dmp

    Filesize

    3.3MB

  • memory/3496-11-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3496-0-0x00007FFFCDA13000-0x00007FFFCDA15000-memory.dmp

    Filesize

    8KB

  • memory/3496-14-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3496-12-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3496-13-0x00007FFFCDA13000-0x00007FFFCDA15000-memory.dmp

    Filesize

    8KB

  • memory/3496-15-0x00007FFFCDA10000-0x00007FFFCE4D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3496-2-0x000001C2A1860000-0x000001C2A1882000-memory.dmp

    Filesize

    136KB