Analysis

  • max time kernel
    133s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 02:36

General

  • Target

    Paleobotanically112/Folkeeventyr/Akvatinterne.ps1

  • Size

    53KB

  • MD5

    323e8c1ff4fc2c93ae5671c534654b5e

  • SHA1

    f70526e464a4c3368b4e406078c6a6fe183cd71e

  • SHA256

    e14799666e4969a2265ee8d4a58aee35e675ea564b7539823e4d803be0ba8b82

  • SHA512

    6f29c8a9a606009762793885de43d5e8bf1327b001536315edb79de35edc5f0b427c30bae95bb29f3b409196613fe29c84d16d9b2935807b709b2c069d0cc561

  • SSDEEP

    1536:Cmy4JXRmObSB+bRKyTo39ImbKRfyz7a3M:NJ2B+6efywM

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Paleobotanically112\Folkeeventyr\Akvatinterne.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:2840
      • C:\Windows\system32\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "2972" "1132"
        2⤵
          PID:2656
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2852

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259399866.txt

              Filesize

              1KB

              MD5

              ea98fd6f492aa6be7cb9f3376b1a9827

              SHA1

              0a6e881837c825fb9861778e43eb45aef916cf85

              SHA256

              d5e38af3b4ffa86593db96b96f272e9662e2f72a490e256fc83d4f7656a42a24

              SHA512

              855bf1a60ad650310bc14ab5f354f1d9ec56ece9ba5f2539fff856beabd21e25f5ae4fe96acd58438c3fb901cf95c698bdc1c207dd545a44f4fb69b5c84a0d2c

            • memory/2852-23-0x0000000003C70000-0x0000000003C80000-memory.dmp

              Filesize

              64KB

            • memory/2852-19-0x0000000004480000-0x0000000004481000-memory.dmp

              Filesize

              4KB

            • memory/2852-18-0x0000000004480000-0x0000000004481000-memory.dmp

              Filesize

              4KB

            • memory/2972-7-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/2972-9-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/2972-10-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/2972-12-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/2972-15-0x0000000002B40000-0x0000000002B44000-memory.dmp

              Filesize

              16KB

            • memory/2972-8-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2972-16-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/2972-17-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2972-4-0x000000001B770000-0x000000001BA52000-memory.dmp

              Filesize

              2.9MB

            • memory/2972-6-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2972-5-0x0000000002240000-0x0000000002248000-memory.dmp

              Filesize

              32KB