Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 12:58
Static task
static1
Behavioral task
behavioral1
Sample
21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps1
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps1
Resource
win10v2004-20241007-en
General
-
Target
21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps1
-
Size
1.1MB
-
MD5
21d9746b4d1970e0e38ce62e2f36270e
-
SHA1
126d0de73b2c8e9276806a02e5c2ee3d1f1a7e7d
-
SHA256
21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44
-
SHA512
4045eca5e5f4f97f530837692256554e3687aafbebd58b53f7bd6f02de3d0c4a3c8c7efbd3edc45971076b435192937f227f6a7a6e67916ff628397bef4b4992
-
SSDEEP
24576:XIJElvW93GPtN3jQeiKAsaLQG0Q0uidX/V:4Q15
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe -
pid Process 2680 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\teViazD4k\DefaultIcon powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\teViazD4k powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\teViazD4k\DefaultIcon\ = "C:\\ProgramData\\teViazD4k.ico" powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.teViazD4k powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.teViazD4k\ = "teViazD4k" powershell.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2680 powershell.exe 2680 powershell.exe 2680 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2844 powershell.exe Token: SeBackupPrivilege 2844 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: 36 2844 powershell.exe Token: SeImpersonatePrivilege 2844 powershell.exe Token: SeIncBasePriorityPrivilege 2844 powershell.exe Token: SeIncreaseQuotaPrivilege 2844 powershell.exe Token: 33 2844 powershell.exe Token: SeManageVolumePrivilege 2844 powershell.exe Token: SeProfSingleProcessPrivilege 2844 powershell.exe Token: SeRestorePrivilege 2844 powershell.exe Token: SeSecurityPrivilege 2844 powershell.exe Token: SeSystemProfilePrivilege 2844 powershell.exe Token: SeTakeOwnershipPrivilege 2844 powershell.exe Token: SeShutdownPrivilege 2844 powershell.exe Token: SeBackupPrivilege 2844 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeBackupPrivilege 2844 powershell.exe Token: SeSecurityPrivilege 2844 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2844 2680 powershell.exe 31 PID 2680 wrote to memory of 2844 2680 powershell.exe 31 PID 2680 wrote to memory of 2844 2680 powershell.exe 31 PID 2680 wrote to memory of 2844 2680 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YCBN99F9RYHH488LDE4Q.temp
Filesize7KB
MD52b5c31b2663e62b6874ec1cd263662fc
SHA13620bfc67ed11692f32f01ac5744936808a6dee6
SHA256332c01a59f97d35a06ccd83993e0f1b8df18bb2c2974cee8aeabd78584e3ea6c
SHA512a7c7400055de2577c27f63e7ec622bc29649cbe90637163440fc2e8c40a53d719ed6551e057bf7645a8763e42558ecf48f681a326e74a9de5a9c9a55ebe58626