Analysis
-
max time kernel
213s -
max time network
277s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/01/2025, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
file01.ps1
Resource
win10v2004-20241007-en
General
-
Target
file01.ps1
-
Size
35B
-
MD5
684c57981b5ed26047c34aee9a2453a1
-
SHA1
2e154e9c0e6abc9a2bc852aeb941fe5d3117fa3e
-
SHA256
20b3dc9a088153eb974afee08192cd0b78c96b847e5705cea818c50043c3bddf
-
SHA512
cca14c6add1e0dfed54e0fe425489bf430bcc438acf386fe4d68cf040fbe55e9997b0d85bcd8cca56e66721292497894b599c919f3af248b4a2ef8a1d112c51b
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 3400 powershell.exe 3 3400 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 236 updater.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 236 set thread context of 840 236 updater.exe 80 -
pid Process 3400 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3400 powershell.exe 3400 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3400 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3400 wrote to memory of 236 3400 powershell.exe 79 PID 3400 wrote to memory of 236 3400 powershell.exe 79 PID 3400 wrote to memory of 236 3400 powershell.exe 79 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80 PID 236 wrote to memory of 840 236 updater.exe 80
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\file01.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\b6bc763a-914a-4d0e-84b0-5acfb7365b63\updater.exe"C:\Users\Admin\AppData\Local\b6bc763a-914a-4d0e-84b0-5acfb7365b63\updater.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.3MB
MD53c096c52d1f6250c1f809cf41fedc0ba
SHA13337edd136b544db4e43b0b1fce2c8cf853677e5
SHA2569ed2684928ee595c5909962c5959509d3e9ea59dd9e048e696d4f20d7b9aca07
SHA512fed9c2b0087a933374252dcaf7c234f7c8ee0e1428054ef0e1a1b2c51be1cd8483ea90b3923ea4223ea5b1765e1009dd5261a2f1ae01b43d39444deca548705f