Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2024, 14:31

General

  • Target

    otherworldly.ps1

  • Size

    54KB

  • MD5

    df1cc5262f98c2cf7f51cc5ed85528d7

  • SHA1

    3d9b2293d194ce127b040b28099591b197b18978

  • SHA256

    c547c1878b7c38fddc357939a52c840910f36b31c6a720af9a125c91eaaed735

  • SHA512

    8612721272dc45dc7b3ddad450ac8f66c48a458d249ff0c1adc5582f10daa644a05511c4837931490677c7c6b9d495d905bc610e4abd62b97c083804747c6b82

  • SSDEEP

    768:OvKcT9rR6ufYsYkYSow0DzhWYeTAISjcrQ6GXtvyRmVM7OgiQcfXkZOE4WD9ivaJ:OvhT9l63xrXV5gAP/xbVM7uOOI99

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 11 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\otherworldly.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4864
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2620
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1120
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:472
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4356
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133753770990725819.txt

    Filesize

    75KB

    MD5

    850eb78955de0e905d50325bebf4f8ea

    SHA1

    554907345713ee0ae770d8bb795d1fb14a2994a4

    SHA256

    8d8c9955fa3290ff14020c544603f0ca46f86d359be250dc60730eac0c662a04

    SHA512

    49a6d3a5856963fb6e919c98e87ca36fff5dc5daa2791b58d69c108493ae6e93bb674d0c05ce47f4180afa59b87201cd22613b0c5f59267590719f8abec8d0da

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pvz3tbzl.bxl.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4464-26-0x000001B16B500000-0x000001B16B600000-memory.dmp

    Filesize

    1024KB

  • memory/4464-44-0x000001B16C480000-0x000001B16C4A0000-memory.dmp

    Filesize

    128KB

  • memory/4464-59-0x000001B16CAA0000-0x000001B16CAC0000-memory.dmp

    Filesize

    128KB

  • memory/4464-31-0x000001B16C4C0000-0x000001B16C4E0000-memory.dmp

    Filesize

    128KB

  • memory/4864-12-0x00007FFDF1890000-0x00007FFDF2351000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-15-0x00007FFDF1890000-0x00007FFDF2351000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-16-0x00007FFDF1890000-0x00007FFDF2351000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-18-0x00007FFDF1890000-0x00007FFDF2351000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-19-0x00007FFDF1890000-0x00007FFDF2351000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-20-0x00007FFDF1890000-0x00007FFDF2351000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-14-0x00000255FA180000-0x00000255FA1A4000-memory.dmp

    Filesize

    144KB

  • memory/4864-13-0x00000255FA180000-0x00000255FA1AA000-memory.dmp

    Filesize

    168KB

  • memory/4864-0-0x00007FFDF1893000-0x00007FFDF1895000-memory.dmp

    Filesize

    8KB

  • memory/4864-11-0x00007FFDF1890000-0x00007FFDF2351000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-6-0x00000255F9C80000-0x00000255F9CA2000-memory.dmp

    Filesize

    136KB