Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
update.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
update.ps1
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
update.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
update.ps1
Resource
win11-20240802-en
General
-
Target
update.ps1
-
Size
4KB
-
MD5
c3a9c69ae58d9f390efcdd39095ec039
-
SHA1
48b97a2fd63f06ce060bdff02ada6143a43221b7
-
SHA256
ccb1996d2a2b57b943611a8928a5a05d69003b1225b9afef40e21017de70be52
-
SHA512
26f467830b9c645e97109782462f7a748ff873c5b84e9b202887dc24910e8070ad9458c45f8705b946f741b9cc8f3f388a7deb667d6ca3a6a70d22478325c7d2
-
SSDEEP
48:RHvWvwuwB3QGjsLCO1UD09tD6ZevCO1Uw5NtDPYPkQ0bISOI03VJ8dHtLbLvlCO7:RhbYs09w4rFBEnD8dHtLXROzBCSIOI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetManager = "\"C:\\Users\\Admin\\AppData\\Roaming\\Net\\client32.exe\"" powershell.exe -
pid Process 2064 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2064 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\update.ps11⤵
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064