Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
bad.ps1
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
bad.ps1
Resource
win10v2004-20241007-en
windows10-2004-x64
22 signatures
150 seconds
General
-
Target
bad.ps1
-
Size
110B
-
MD5
23459f07fe98c203526160a5b19ee84a
-
SHA1
b865f279d511965afb81d100d771557b02c5539f
-
SHA256
e0d913450fcaf59df1b73c7855bb838ff86ddc84045ca69c72ebc7a8c8a53b8f
-
SHA512
e3b4e3715eed7db197ba032f5b40b1f9476b8201cbfc39bfe60d8211cd921092c854b64e0921f28150f5dee212a688eb03630425b21b0645480594c6e8ac81a3
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 5 1732 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\FEpgBy\\client32.exe" powershell.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 2116 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 1732 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 1732 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
powershell.execmd.exedescription pid Process procid_target PID 1732 wrote to memory of 2116 1732 powershell.exe 31 PID 1732 wrote to memory of 2116 1732 powershell.exe 31 PID 1732 wrote to memory of 2116 1732 powershell.exe 31 PID 1732 wrote to memory of 2428 1732 powershell.exe 32 PID 1732 wrote to memory of 2428 1732 powershell.exe 32 PID 1732 wrote to memory of 2428 1732 powershell.exe 32 PID 2428 wrote to memory of 2800 2428 cmd.exe 33 PID 2428 wrote to memory of 2800 2428 cmd.exe 33 PID 2428 wrote to memory of 2800 2428 cmd.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\bad.ps11⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:2116
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib +h C:\Users\Admin\AppData\Roaming\FEpgBy2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\AppData\Roaming\FEpgBy3⤵
- Views/modifies file attributes
PID:2800
-
-