Resubmissions

21/01/2025, 14:05

250121-rd357sxper 8

20/01/2025, 21:06

250120-zx14ysyqdn 10

Analysis

  • max time kernel
    213s
  • max time network
    277s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21/01/2025, 14:05

General

  • Target

    file01.ps1

  • Size

    35B

  • MD5

    684c57981b5ed26047c34aee9a2453a1

  • SHA1

    2e154e9c0e6abc9a2bc852aeb941fe5d3117fa3e

  • SHA256

    20b3dc9a088153eb974afee08192cd0b78c96b847e5705cea818c50043c3bddf

  • SHA512

    cca14c6add1e0dfed54e0fe425489bf430bcc438acf386fe4d68cf040fbe55e9997b0d85bcd8cca56e66721292497894b599c919f3af248b4a2ef8a1d112c51b

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\file01.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3400
    • C:\Users\Admin\AppData\Local\b6bc763a-914a-4d0e-84b0-5acfb7365b63\updater.exe
      "C:\Users\Admin\AppData\Local\b6bc763a-914a-4d0e-84b0-5acfb7365b63\updater.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:236
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fkc44in1.2j5.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\b6bc763a-914a-4d0e-84b0-5acfb7365b63\updater.exe

    Filesize

    5.3MB

    MD5

    3c096c52d1f6250c1f809cf41fedc0ba

    SHA1

    3337edd136b544db4e43b0b1fce2c8cf853677e5

    SHA256

    9ed2684928ee595c5909962c5959509d3e9ea59dd9e048e696d4f20d7b9aca07

    SHA512

    fed9c2b0087a933374252dcaf7c234f7c8ee0e1428054ef0e1a1b2c51be1cd8483ea90b3923ea4223ea5b1765e1009dd5261a2f1ae01b43d39444deca548705f

  • memory/840-82-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/840-81-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/840-80-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/840-79-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/840-78-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3400-11-0x00007FF8EB650000-0x00007FF8EC112000-memory.dmp

    Filesize

    10.8MB

  • memory/3400-16-0x00007FF8EB650000-0x00007FF8EC112000-memory.dmp

    Filesize

    10.8MB

  • memory/3400-15-0x00007FF8EB653000-0x00007FF8EB655000-memory.dmp

    Filesize

    8KB

  • memory/3400-75-0x00007FF8EB650000-0x00007FF8EC112000-memory.dmp

    Filesize

    10.8MB

  • memory/3400-77-0x00007FF8EB650000-0x00007FF8EC112000-memory.dmp

    Filesize

    10.8MB

  • memory/3400-13-0x000001CCF6B30000-0x000001CCF72D6000-memory.dmp

    Filesize

    7.6MB

  • memory/3400-12-0x00007FF8EB650000-0x00007FF8EC112000-memory.dmp

    Filesize

    10.8MB

  • memory/3400-0-0x00007FF8EB653000-0x00007FF8EB655000-memory.dmp

    Filesize

    8KB

  • memory/3400-10-0x00007FF8EB650000-0x00007FF8EC112000-memory.dmp

    Filesize

    10.8MB

  • memory/3400-9-0x000001CCF5F90000-0x000001CCF5FB2000-memory.dmp

    Filesize

    136KB

  • memory/3400-87-0x00007FF8EB650000-0x00007FF8EC112000-memory.dmp

    Filesize

    10.8MB