Analysis

  • max time kernel
    133s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 02:03

General

  • Target

    Mellemregningen14.ps1

  • Size

    50KB

  • MD5

    c1a99f6520552a8cd0186b390887b21c

  • SHA1

    1982354532b61d5a6f34758473ba8fa0d526aac9

  • SHA256

    e6df54df126140a5a615ad2ef44fc375a6276080fd1c39ad6bd16dbb5e3c2204

  • SHA512

    fe5f00348ca1e8a618dee573d45aeed609d91d24119a9b1609aa77c9cbb9ee901892c137020fb13bd037e316620c91a299cead1ff7f48a28713d450ba326a1be

  • SSDEEP

    1536:Ph2HGRZuseVJyL798Baok5Ezn+Yx1dU7gLBwgR:KGruBJs7Ork5Y7s7MBwgR

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Mellemregningen14.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:2648
      • C:\Windows\system32\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "2312" "1128"
        2⤵
          PID:2688
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259402053.txt

        Filesize

        1KB

        MD5

        ef0f54c4330e57fce7f9ad831e5fd36b

        SHA1

        d879e26c784dc1f0572d7b6a18a91bf6a60fe315

        SHA256

        675bdf1444971e29b58afdc89ff59b7551490632ea578bc52aba004bfa63562f

        SHA512

        227a963564e9b3d89c871916a738199c7ba9cf734ab4a6754a2a66939315a9e3aca4036ea9ba1a7d24153caceaab8399b9e014a2e28506b176017b45739d81fc

      • memory/2312-10-0x0000000002DF0000-0x0000000002E70000-memory.dmp

        Filesize

        512KB

      • memory/2312-6-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

        Filesize

        32KB

      • memory/2312-7-0x0000000002DF0000-0x0000000002E70000-memory.dmp

        Filesize

        512KB

      • memory/2312-8-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

        Filesize

        9.6MB

      • memory/2312-9-0x0000000002DF0000-0x0000000002E70000-memory.dmp

        Filesize

        512KB

      • memory/2312-4-0x000000001B7A0000-0x000000001BA82000-memory.dmp

        Filesize

        2.9MB

      • memory/2312-12-0x0000000002DF0000-0x0000000002E70000-memory.dmp

        Filesize

        512KB

      • memory/2312-5-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

        Filesize

        9.6MB

      • memory/2312-14-0x00000000029B0000-0x00000000029B4000-memory.dmp

        Filesize

        16KB

      • memory/2312-16-0x0000000002DF0000-0x0000000002E70000-memory.dmp

        Filesize

        512KB

      • memory/2312-17-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

        Filesize

        9.6MB

      • memory/2684-18-0x00000000042E0000-0x00000000042E1000-memory.dmp

        Filesize

        4KB

      • memory/2684-19-0x00000000042E0000-0x00000000042E1000-memory.dmp

        Filesize

        4KB

      • memory/2684-23-0x00000000025E0000-0x00000000025F0000-memory.dmp

        Filesize

        64KB