Resubmissions

07/03/2025, 19:55

250307-ynad7swms2 10

07/03/2025, 17:58

250307-wj7g2atzet 10

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 17:58

General

  • Target

    ddd.ps1

  • Size

    2.4MB

  • MD5

    5b322ca0eb9655beaf39e4453d141cd2

  • SHA1

    b556cbaf50c2b77fd73d4386f068f0bbffe7504d

  • SHA256

    b2082d4666cd9eb57896b04058438fad6a268e504d877b908ae276b3c68799fe

  • SHA512

    0648609146167599498b41bdb97c02eb0947ba03e44ee63c3448bd6b2508b4bd7054a63671c12120b01240bba810489da68e3f79dc2a7674447ad760127dcc1b

  • SSDEEP

    1536:P26vgn00oR/S7rdvtk76qu6p5LSTFPNWdD7uHzgjw8b560jSKkjptOVNjC5GGQli:bYf

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ddd.ps1
    1⤵
    • Deletes itself
    • Adds Run key to start application
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2424-4-0x000007FEF624E000-0x000007FEF624F000-memory.dmp

    Filesize

    4KB

  • memory/2424-5-0x000000001B660000-0x000000001B942000-memory.dmp

    Filesize

    2.9MB

  • memory/2424-6-0x0000000001F00000-0x0000000001F08000-memory.dmp

    Filesize

    32KB

  • memory/2424-7-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-8-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-10-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-9-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-11-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-13-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-17-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-16-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-15-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-14-0x000007FEF624E000-0x000007FEF624F000-memory.dmp

    Filesize

    4KB

  • memory/2424-18-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-20-0x0000000002C70000-0x0000000002C7E000-memory.dmp

    Filesize

    56KB

  • memory/2424-23-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB