Overview
overview
10Static
static
102020.10.29...3d.dll
windows7-x64
32020.10.29...3d.dll
windows10-2004-x64
32020.10.29...f8.ps1
windows7-x64
62020.10.29...f8.ps1
windows10-2004-x64
32020.10.29...05.dll
windows7-x64
12020.10.29...05.dll
windows10-2004-x64
12020.10.29...16.dll
windows7-x64
12020.10.29...16.dll
windows10-2004-x64
12020.10.29...42.ps1
windows7-x64
32020.10.29...42.ps1
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2025, 10:11
Behavioral task
behavioral1
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642.ps1
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642.ps1
Resource
win10v2004-20250217-en
General
-
Target
2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8.ps1
-
Size
4.1MB
-
MD5
65419948186842f8f3ef07cafb71f59a
-
SHA1
93537b0814177e2101663306aa17332b9303e08a
-
SHA256
134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8
-
SHA512
83d093c6febacb11fcde57fee98c2385f628e5cd3629bfabd0f9e4d2c5de18c6336b3d3aff8081b06a827e742876d19ae370e81890c247daac73d4f8b7ea5f90
-
SSDEEP
24576:+vq2EYNg0gX792UHDoSe9Ov2a8p+JnHZUoWYWUpcfm3WuPhu/aqJOFKs4Wuw054o:Drr9q0v4ubJmg4OFuwkOM5NZihxs
Malware Config
Signatures
-
pid Process 1532 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1532 powershell.exe 1532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1532 wrote to memory of 3180 1532 powershell.exe 89 PID 1532 wrote to memory of 3180 1532 powershell.exe 89 PID 3180 wrote to memory of 3532 3180 csc.exe 91 PID 3180 wrote to memory of 3532 3180 csc.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\2020.10.29_CISA-MAR-10310246_Powershell_Backdoor\134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3fg0b51b\3fg0b51b.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA2D7.tmp" "c:\Users\Admin\AppData\Local\Temp\3fg0b51b\CSCAFCDA439A2F1485EA1C68C064A023B4.TMP"3⤵PID:3532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bcd1d0850385a37244e88f7cfa8edf5d
SHA1df59b50503d85c5c8a94ca4b08244ce7c84d7a34
SHA2562fe6af31748253835b588fffa9f0d552cddffa90614cfae91896c1b6ab420eb2
SHA51293988e0be93f2c76fb772c3ef2580b8b97f6f25c192a862b90c4c5bb1df43538df9f832320ff590a87d5a5f454cb66519ab3ce6225a8063c07d269c88f1c6359
-
Filesize
1KB
MD51b93a18f400cd5ff51f2834c16aa29c9
SHA1b9943e81693b1d662885367abe6a5aa4ef95e19b
SHA25636f083f6453a6b97c74ad4323d685c10382f3d0c718e36b104ad61bee2126cd8
SHA512d9cd5f4d334e27e186357a83ac07b556edf9e69d7bae6098199c831cf33f7a53747eb4f6b0d50a86fe3afd893991dc23e1f1193046084279a9bfe2d2677a494f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
267B
MD59a5354e267b72f1a15a5d2e66a2e0788
SHA12db1d1a809659312bf45f91d41777360526c0a67
SHA256154e4bdda09648d3e855b1e47488b00c323787125351556787f83c95c441f724
SHA5124a47a58d75da136da493821b3212c15e53ea13204f35f9fcbaf6177356aba5b2ea0c60071daae93dd3d00c395c7dae5f559117dc851ea4a5d8612b0088ec1f01
-
Filesize
369B
MD569c16565cbb59a12fc7f28d2e66d4763
SHA1523acd399ab8c5a5dc5a7d449282eb2e06437374
SHA2567ce2f05acac1892ee73a818969338a6d3952fb32b857119c5aa5c89c5ee05c60
SHA512dde9d7d00435af05f99d58952b3ae3b6daa8e57d25883370cc1ddce63ee90abf84959c6a066f5a109c47c5e7fdeccd5e902b523991daeaf2e2e6a5b901c67b62
-
Filesize
652B
MD5236d2bd2946d0f016c96653ced7886c0
SHA1bf4fd88e32245204082a2cf254b79d68bd039950
SHA25625f9ddbd87cbb900d235fe7ea185b13261fd241b6cd091191858bb8853992444
SHA512d1fcbde3714ed4c42c246e327bc9bf93517f79d1de7fc59053c9302f72c43ce8b26e179817c633463046c663185d146e94143515dd9fa2288576ab6a9afa4dcb