Resubmissions

10-01-2025 13:36

250110-qwg51sxphm 10

10-01-2025 12:58

250110-p7ryxsxjfr 10

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 12:58

General

  • Target

    21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps1

  • Size

    1.1MB

  • MD5

    21d9746b4d1970e0e38ce62e2f36270e

  • SHA1

    126d0de73b2c8e9276806a02e5c2ee3d1f1a7e7d

  • SHA256

    21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44

  • SHA512

    4045eca5e5f4f97f530837692256554e3687aafbebd58b53f7bd6f02de3d0c4a3c8c7efbd3edc45971076b435192937f227f6a7a6e67916ff628397bef4b4992

  • SSDEEP

    24576:XIJElvW93GPtN3jQeiKAsaLQG0Q0uidX/V:4Q15

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\21a7fba68d5abd4c3837521c2e86a03454e98a4f9517fa83ff00c47fb3c4cd44.ps1
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YCBN99F9RYHH488LDE4Q.temp

    Filesize

    7KB

    MD5

    2b5c31b2663e62b6874ec1cd263662fc

    SHA1

    3620bfc67ed11692f32f01ac5744936808a6dee6

    SHA256

    332c01a59f97d35a06ccd83993e0f1b8df18bb2c2974cee8aeabd78584e3ea6c

    SHA512

    a7c7400055de2577c27f63e7ec622bc29649cbe90637163440fc2e8c40a53d719ed6551e057bf7645a8763e42558ecf48f681a326e74a9de5a9c9a55ebe58626

  • memory/2680-10-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2680-8-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2680-6-0x0000000002710000-0x0000000002718000-memory.dmp

    Filesize

    32KB

  • memory/2680-9-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2680-5-0x000000001B740000-0x000000001BA22000-memory.dmp

    Filesize

    2.9MB

  • memory/2680-4-0x000007FEF603E000-0x000007FEF603F000-memory.dmp

    Filesize

    4KB

  • memory/2680-11-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2680-7-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2844-14-0x00000000055D0000-0x00000000055F2000-memory.dmp

    Filesize

    136KB

  • memory/2844-21-0x00000000055D0000-0x00000000055F2000-memory.dmp

    Filesize

    136KB

  • memory/2844-29-0x00000000055D0000-0x00000000055F2000-memory.dmp

    Filesize

    136KB

  • memory/2844-34-0x00000000055D0000-0x00000000055F2000-memory.dmp

    Filesize

    136KB