Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
9a4147fcc9d6561e1548496ef1759ad73d93e1743e93d3c57490333eb9681915.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a4147fcc9d6561e1548496ef1759ad73d93e1743e93d3c57490333eb9681915.ps1
Resource
win10v2004-20240802-en
General
-
Target
9a4147fcc9d6561e1548496ef1759ad73d93e1743e93d3c57490333eb9681915.ps1
-
Size
1KB
-
MD5
8f1d78748da0355f1e790721d367bf94
-
SHA1
a38e5e771a7723685b4c7dcdd1aef475cd293a7a
-
SHA256
9a4147fcc9d6561e1548496ef1759ad73d93e1743e93d3c57490333eb9681915
-
SHA512
e0be1cbbe3630c7ba1174a2cfe0e4616bfb34f4f5cf77eaeb7be517f2188b48cfbfa2c75ff0cb018a4db8f6caf617aa3963af600288330881e74a4840af101cc
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1248 powershell.exe -
pid Process 3004 powershell.exe 1248 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3004 powershell.exe 1248 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1248 3004 powershell.exe 32 PID 3004 wrote to memory of 1248 3004 powershell.exe 32 PID 3004 wrote to memory of 1248 3004 powershell.exe 32 PID 3004 wrote to memory of 2776 3004 powershell.exe 35 PID 3004 wrote to memory of 2776 3004 powershell.exe 35 PID 3004 wrote to memory of 2776 3004 powershell.exe 35
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9a4147fcc9d6561e1548496ef1759ad73d93e1743e93d3c57490333eb9681915.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "3004" "1368"2⤵PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ca916e9c4f91decc9024bb0ed14ef6c3
SHA1f3a2a534e97f714b0fb3346b32925b90e8e4bdd4
SHA25600022f8cf1515283f2f1c76d24954afa7b6b534735cc40e57ed7687cd7c2315f
SHA5126961e64aa3efcf5d121c1643e062a2fd428d25077d2ff341ac83cecd0ff6185b47a8b66efaf5c9db7cf891fa5af8393cb72a3bee6bf662331480e9caa615aef0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58b6d0217c61e5c6cef59b7d370b1f57a
SHA117e2f780ad6d7452e8901f9a3f505efb31c613ec
SHA2568b302465f1ca8b54f48e2d5e5ceaa9598c431af8c77a7508b5171f4a369d5b7a
SHA5123a5f9707e18e81ebbf0f7a6fd9d3f8ef8b6bbdb025dbe097cfd1e946ad1fec255921ab48ba9ed7ef16d80520c1b0d13b5e0e413b07d9ae3116f11b5392404bd2