Analysis

  • max time kernel
    133s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2024 01:30

General

  • Target

    Pyrograph/Perikoner/Intermeasuring199/Skibshandlernes.ps1

  • Size

    58KB

  • MD5

    161d266563cfa870571bd2a76a200777

  • SHA1

    4dad793c0fc2ff315bd201e80cf414864bea5409

  • SHA256

    33095bc104b3928f5a857d2572be6afe3b9890ae110cd9aaf52ceb6a29e943fd

  • SHA512

    430418fa2d550afd8f616420020c1c3d452488d45ba0d0d1b1a296ecc21eca816810872adce077612f12f88a1130c111560cba48b6286f06fb9ac6305729980a

  • SSDEEP

    768:X7Etn9kgxHh0sMNB7kPM2OdEpivZnGL3tZDPrKY1U4CibG3WCnct7dbmsd5apjk5:tgxHGD7kPLOd0My3vCiGHctn3l8i

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Pyrograph\Perikoner\Intermeasuring199\Skibshandlernes.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:2632
      • C:\Windows\system32\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "620" "1136"
        2⤵
          PID:2860
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2576

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259417117.txt

        Filesize

        1KB

        MD5

        642dd6ac427451ef6d3848c7d1b4c7f6

        SHA1

        9684428988cd9a68e401dfe627a0159153fc928a

        SHA256

        94430bcf35aba8d9a6f7d17c61540a4e6e9088ec1229586966457b5329426e40

        SHA512

        d646cb0af23f126a2d731e9cd3094df57010c6fda875ae0796eac88f9a8e053c0bdf991cb5384aea8f4ea71a4f1c463c57b796c954e3205241e664a2b6afa577

      • memory/620-13-0x0000000002490000-0x0000000002510000-memory.dmp

        Filesize

        512KB

      • memory/620-14-0x000000001B270000-0x000000001B274000-memory.dmp

        Filesize

        16KB

      • memory/620-7-0x0000000002490000-0x0000000002510000-memory.dmp

        Filesize

        512KB

      • memory/620-8-0x0000000002490000-0x0000000002510000-memory.dmp

        Filesize

        512KB

      • memory/620-9-0x0000000002490000-0x0000000002510000-memory.dmp

        Filesize

        512KB

      • memory/620-10-0x000007FEF5E40000-0x000007FEF67DD000-memory.dmp

        Filesize

        9.6MB

      • memory/620-5-0x0000000002560000-0x0000000002568000-memory.dmp

        Filesize

        32KB

      • memory/620-4-0x000000001B310000-0x000000001B5F2000-memory.dmp

        Filesize

        2.9MB

      • memory/620-11-0x0000000002490000-0x0000000002510000-memory.dmp

        Filesize

        512KB

      • memory/620-6-0x000007FEF5E40000-0x000007FEF67DD000-memory.dmp

        Filesize

        9.6MB

      • memory/620-18-0x0000000002490000-0x0000000002510000-memory.dmp

        Filesize

        512KB

      • memory/620-17-0x000007FEF5E40000-0x000007FEF67DD000-memory.dmp

        Filesize

        9.6MB

      • memory/2576-19-0x0000000004090000-0x0000000004091000-memory.dmp

        Filesize

        4KB

      • memory/2576-20-0x0000000004090000-0x0000000004091000-memory.dmp

        Filesize

        4KB

      • memory/2576-24-0x00000000027A0000-0x00000000027B0000-memory.dmp

        Filesize

        64KB