Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
INTECHRFQEN241813.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
INTECHRFQEN241813.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
bodaciously.com
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
bodaciously.com
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
radials.ps1
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
radials.ps1
Resource
win10v2004-20241007-en
General
-
Target
radials.ps1
-
Size
52KB
-
MD5
48bfb2d69f3a797169c8b44b71e7bb6a
-
SHA1
2a3e1bb359707f2ad6325b2f8520e95945ebc6fe
-
SHA256
95da5b6aa5c574eda69ebc3c020ad6163faa508e9bb37dd42f9b4290adc61ef0
-
SHA512
688344cc79016b6678acae2a4302b945f81cf5f9abc81b9c783b2d94381d11d4c3b8d2d066452be8ea21c8312cdd3ef59d4a41d0f95496a072a071c8dadbaf1d
-
SSDEEP
1536:ZazzEOZZXf8+7oAvmHg2lpTccbx978aGaDm/:Az4gZvp7u7pfbf7IX/
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 1656 powershell.exe 1656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 1656 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 1656 wrote to memory of 2872 1656 powershell.exe 31 PID 1656 wrote to memory of 2872 1656 powershell.exe 31 PID 1656 wrote to memory of 2872 1656 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\radials.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1656" "852"2⤵PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bead1b6b54dacf518b560530bffca86a
SHA1c8a5733436040c80ef9614fe2370d1f7e0b5accf
SHA256b5cd688d6ee6bdfb9f9140459139f26fff39771e6c9ab6c9228358240b24662a
SHA5122b4a64bcc753262822279b660155ef035817633c0f7960de8ab65bd6289e148e26c7920a7366a9babe7f8e50095d81550040acec89b6c46cdb36f73e53e04243