Analysis

  • max time kernel
    193s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 09:22

General

  • Target

    Melitta/Assonantic/evakueringsvelsers/Jakobskamp/Blyantstegninger.ps1

  • Size

    42KB

  • MD5

    a986fd781b75d8deae5059a8eaf9947b

  • SHA1

    00e654981fe37b648a5799c04856830d83345736

  • SHA256

    c2fb393897717d953dfd2ccfd179fccba1dbae00fa6c7a9ca46610b78b9ba085

  • SHA512

    ccc7b6aacc718ab09d871e933227d02299e9c9c119669f15804d988b46d7ba0db45aedf6d1a61f4844ec091d6a6e9ef3e0557b3c50420693453a2df59c4b2545

  • SSDEEP

    768:lq3bgwBoUUAvXmZR+FL6lYPl8ULiLBnQNHBivEWkS+gs19:816QXw+slYPZLilQLkEWkSs19

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Melitta\Assonantic\evakueringsvelsers\Jakobskamp\Blyantstegninger.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "3056" "880"
      2⤵
        PID:2736
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259399102.txt

      Filesize

      1KB

      MD5

      b502aac7dc22ad1b60d37241c4c3a6ea

      SHA1

      fbd54a75237d224e3ee4510d8902e74a9438d692

      SHA256

      de5bcb1cea7be20a80b7cd1cc1a0842441d88d013701d18f2a994e72f9fadf63

      SHA512

      c0cc2c604db9b2134706e61c139624773fafea1c78f730a10c12316bb97f2307a9ce00c4511846148103708d61ca2fb25156c613ecd274c5c4f8e884bcf94e1e

    • memory/2800-24-0x00000000029B0000-0x00000000029C0000-memory.dmp

      Filesize

      64KB

    • memory/2800-20-0x0000000004340000-0x0000000004341000-memory.dmp

      Filesize

      4KB

    • memory/2800-19-0x0000000004340000-0x0000000004341000-memory.dmp

      Filesize

      4KB

    • memory/3056-13-0x00000000029F0000-0x0000000002A70000-memory.dmp

      Filesize

      512KB

    • memory/3056-9-0x00000000029F0000-0x0000000002A70000-memory.dmp

      Filesize

      512KB

    • memory/3056-10-0x00000000029F0000-0x0000000002A70000-memory.dmp

      Filesize

      512KB

    • memory/3056-11-0x00000000029F0000-0x0000000002A70000-memory.dmp

      Filesize

      512KB

    • memory/3056-4-0x000000001B650000-0x000000001B932000-memory.dmp

      Filesize

      2.9MB

    • memory/3056-8-0x000007FEF54F0000-0x000007FEF5E8D000-memory.dmp

      Filesize

      9.6MB

    • memory/3056-16-0x0000000002B00000-0x0000000002B04000-memory.dmp

      Filesize

      16KB

    • memory/3056-17-0x00000000029F0000-0x0000000002A70000-memory.dmp

      Filesize

      512KB

    • memory/3056-18-0x000007FEF54F0000-0x000007FEF5E8D000-memory.dmp

      Filesize

      9.6MB

    • memory/3056-7-0x00000000029F0000-0x0000000002A70000-memory.dmp

      Filesize

      512KB

    • memory/3056-6-0x000007FEF54F0000-0x000007FEF5E8D000-memory.dmp

      Filesize

      9.6MB

    • memory/3056-5-0x0000000002670000-0x0000000002678000-memory.dmp

      Filesize

      32KB