Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
ps1001.ps1
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ps1001.ps1
Resource
win10v2004-20241007-en
General
-
Target
ps1001.ps1
-
Size
785KB
-
MD5
5996b2aa1d6b234a48ed62f1ecaae159
-
SHA1
4f6e56e34d7da66cb1f9b9ebc707f7fd01764352
-
SHA256
100a4c16630356774d7ebee6681d40279fcb4ceabccf194d371af739ca98ce53
-
SHA512
6d74c8bd7f52fedf55068a58cca93ce30582517a40d556b07c3f3ec3d5f17283b2cc7852601331bd77d1a3fd8f09b2f3cc6ebd7a2c6fa8a34cee45363eb80d0f
-
SSDEEP
12288:8ppYXT60Mv5a8kebcetZ3Aq74GA19Td1JplTmu5jP+D/43EeI1gZEtd14Q2f3Nug:fXWZ5Pbcq92zjP+sjI10+r4Q21ug
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid Process 11 4836 powershell.exe 17 4836 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 4836 powershell.exe 4836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 4836 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.execsc.exedescription pid Process procid_target PID 4836 wrote to memory of 3228 4836 powershell.exe 84 PID 4836 wrote to memory of 3228 4836 powershell.exe 84 PID 3228 wrote to memory of 3172 3228 csc.exe 85 PID 3228 wrote to memory of 3172 3228 csc.exe 85
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ps1001.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xsh1doht\xsh1doht.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES833A.tmp" "c:\Users\Admin\AppData\Local\Temp\xsh1doht\CSC9AC4822B76BF437D86F28419A85712D8.TMP"3⤵PID:3172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb56a30a0a8914d80f062d2b0b665c9b
SHA14dfbc8016f832de5ff9096d693f476de33ba1874
SHA256dce66c14601ea1972626324db4b6c9dc760d0bf943f37c37247e75a22c6ba382
SHA51256dddb6486c2813b1b3d4276edd5d8478289e11859f57bf833982ad9900528e0348c2f0d0036ef01ac56a9052e01804d64abaa799bf2b95759f5c3a33dee5c39
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD54fd45606821769bbf06fe8537eb54e1c
SHA1a85be399f3908395b0e915ec3f509e3aa2a06047
SHA256f47c6ab3387b65db25d92ef533cfdd575853bb184d492d7e9bfee9edf9eda2b2
SHA512861a5e5f3dea4c92c76eb6e044c410177394fe0b08d8f84da144561c8597c13fa472a9d2d886a8778982f7d9bd0a37ccb39d8949e0b21285b0ae6d8bb55de01e
-
Filesize
652B
MD52d2aa6baad473340ebdf3cdd37bf3b18
SHA190cafeaa61704452607bac66ae78ccfba2325eef
SHA25669b302648ae7446af09b2349f4264988ed69865ce9b140ff6f825864f0c6285b
SHA512d58a3f3dc50c0dd08619abf50655d1344115767bb4939cbbf949f4aa90b36c022db59fdebf0e87d0cb60af146c46cef37e2f67ad4430997a0364e6670553a2f9
-
Filesize
1KB
MD55989018a4c0ad9cc8bc4cc1e5524186c
SHA1ec9217244192c5ec96b4ac67982ac05983036569
SHA256f2c563322c4d6a4c8b00946b48e3a59b45d8ec5991d977acd4514960f8fab4e5
SHA5122550fb415b2022e3e3d14be551310c7c6821d8b1af7854253d8701f5376d720e1f661c0177f24b0f3bfedf90469064c107d72b1dcac6efa355c24dc6aa786975
-
Filesize
369B
MD5588f4d159e469996c6668d0090d98494
SHA1bd5fc2289c92f2419980f7a7ad8f0f66376b718b
SHA25683603ddcf38ef051f3a5eccc5430555db38314f3f1e2a4a0dc01489e7fcb5611
SHA5123c38a88bd09f08794b205904c2ef96f71d97af3c49133bd74fa068169075ae57351552b9afa3bb9a26ef18fb630061a5363b48c152556fcdfaa8278a7a46890b