Analysis

  • max time kernel
    26s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 14:45

General

  • Target

    payload_x86.ps1

  • Size

    3KB

  • MD5

    194d1495881b3eb9703f20e7d48eaefd

  • SHA1

    688fcec91893ad30ea12c116466436acce00ded4

  • SHA256

    440483f6bcb2ff8dca2d44e715f72db314056ad7e90ccb48135ad5c9a8c0f578

  • SHA512

    95655c3fdb248cd59b0e5d3789d283e602722a51c4692af6a9a025abcc9e2324697d3e8dde42724a637605fa6853c7e17f0d82e8e190fd57100066844a08fe1b

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\payload_x86.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2376
    • \??\c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
      "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -s -NoLogo -NoProfile
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\APM2OGT2J873DPMTW330.temp

    Filesize

    7KB

    MD5

    a65d64608b84eafab82c1a8c952672cf

    SHA1

    325b6f922826bdfdefe30fa42e79f1b53b669138

    SHA256

    219d2a57ea0f719b2a73da6114320cc517c7ef2b6b77aeff9e9e7d346e909c44

    SHA512

    eb5b11e7453e2cb5067c6c1bc59028d846393923d4672146c6e76e8505d3ef4ba406d30e506810591f71a9c0cbfc93b3a2288038442f2c4f0546eea8800fd60e

  • memory/2376-7-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2376-12-0x0000000002AA0000-0x0000000002AD2000-memory.dmp

    Filesize

    200KB

  • memory/2376-4-0x000007FEF5BDE000-0x000007FEF5BDF000-memory.dmp

    Filesize

    4KB

  • memory/2376-8-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2376-9-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2376-10-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2376-11-0x0000000002AA0000-0x0000000002AD2000-memory.dmp

    Filesize

    200KB

  • memory/2376-6-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

    Filesize

    32KB

  • memory/2376-5-0x000000001B610000-0x000000001B8F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2376-15-0x000007FEF5BDE000-0x000007FEF5BDF000-memory.dmp

    Filesize

    4KB

  • memory/2376-16-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2376-17-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2376-18-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2376-19-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB