Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
ps1005.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ps1005.ps1
Resource
win10v2004-20241007-en
General
-
Target
ps1005.ps1
-
Size
754KB
-
MD5
a2c4cc351ca68d5557993baefa5f004c
-
SHA1
4f340f6e249581d5819e9e91da3d15e920920f4d
-
SHA256
897f7ff8eb2f049f340deb3891622bbe656d6d59ec03dc6aebd92bb0c20cf312
-
SHA512
1e2195e002ebed21cf0260961ac8707bd46c062e112cc6a853305416a80fd12ef1b1fec6a3f6fde15289350fabb7cd8e74e633091a075f5f168b0c9b3e51a2d5
-
SSDEEP
12288:8ppYXT60Mv5a8kebcetZ3Aq74GA19Td1JplTmu5jP+D/43EeI1gZEtd14Q2fewYp:fXWZ5Pbcq92zjP+sjI10+r4Q2sp
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid Process 14 5000 powershell.exe 20 5000 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 5000 powershell.exe 5000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 5000 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.execsc.exedescription pid Process procid_target PID 5000 wrote to memory of 3652 5000 powershell.exe 84 PID 5000 wrote to memory of 3652 5000 powershell.exe 84 PID 3652 wrote to memory of 5056 3652 csc.exe 85 PID 3652 wrote to memory of 5056 3652 csc.exe 85
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ps1005.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\svpvhzjr\svpvhzjr.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA42F.tmp" "c:\Users\Admin\AppData\Local\Temp\svpvhzjr\CSCCE06C79F34434F268BDDCE7A2AFB7F0.TMP"3⤵PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50886698d4bb1a857ba72b97eb485d079
SHA10d8c32600ad7eeff8ecae27c4a7c7e705f89237b
SHA256e249d546c68c28d4ff0c83cc8b69ad733550e25f785c74c154f81789e55af99c
SHA51244e871c81fb2adb0afd47d545ef1b7596961ba16929d7d128350d4e0967acd8b35ffdca00ea9c5c8f5644bcd72fc38a35fc6ad6d85a3776c9a1aa0525a122bbf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD55a875455dc5d381ff7300d9e9c603eea
SHA12fbb491e1a10392d60b679a10709acd31edb0be7
SHA2567e7be75be700a0c0cc6fd108913e0dc626ae9494aa8ad824005ff118837bc128
SHA5122aa52bf8903c852251c151ca1c79d3e487628996a53de25c89c88d6a329f10440499469e050456403f5b5bec15524dfcf0a6752ffc880cacef84cea53f3ab628
-
Filesize
652B
MD5201b03236c8d5eef9babe6fd0276b9de
SHA155fa32102855b7f09a3f1c1276fc44e7fea46cdc
SHA256ec55aacef98a06642e94cb1c1c139a590112faece133d5467d748a33b5510b62
SHA5121f603a9a1b9fab1a1b9f6fcbab910c5046f314ea0446d8b9563e8e8c2848e62cc4338c0996d842fc9b86f9ebeb98ff0e4c237bd95b778de6c1e38d6b6706aaf0
-
Filesize
1KB
MD55989018a4c0ad9cc8bc4cc1e5524186c
SHA1ec9217244192c5ec96b4ac67982ac05983036569
SHA256f2c563322c4d6a4c8b00946b48e3a59b45d8ec5991d977acd4514960f8fab4e5
SHA5122550fb415b2022e3e3d14be551310c7c6821d8b1af7854253d8701f5376d720e1f661c0177f24b0f3bfedf90469064c107d72b1dcac6efa355c24dc6aa786975
-
Filesize
369B
MD574bc0efbfe1f4ae21970fdec9e345792
SHA1350abc4d36b37274f8ba7a7e960ec05f0b44b010
SHA256aad4ad324fdb00da551f3ecc9d2db3234c6481282a5aac36fcfe74d039260c2a
SHA512061bc90c3b6798ad9572eb8e8d2bcc24212957a3f240f26c83dae3184c3357c4b92339ddb58069397d2153b1e09c738122ae2deb991404ac1e85afce357ccc1e