Analysis

  • max time kernel
    132s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2024 12:09

General

  • Target

    ravnemorens/Frsteinstanserne/Instantiations.ps1

  • Size

    54KB

  • MD5

    63d0c546b30964e943c2ac8fd5e236db

  • SHA1

    7d46713cb1d3cbfe25efcaf24369fb067d310920

  • SHA256

    eb26aa5b4ec7a1c0c0ad2be344c02a23f770815a40e84e5b1b5fe24c9b64edda

  • SHA512

    91399fec920e3be9526e1af39a632512c6c00cea3566a9ce43fdbadf813c5b2b830620bfc381747b195a4e2c52b8ef4d81295b484ea6ed925979a97b8cf6a1ed

  • SSDEEP

    768:stRSpMsDEBbiYzC9AUQg+Fj0VY6fgw8cl+ZzPhkrV439KaEJQkP5HF0GEFGRGI:uRUM0qbiCYYo3gnZzPKrOtKaiT8rE

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ravnemorens\Frsteinstanserne\Instantiations.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:3000
      • C:\Windows\system32\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "2392" "1088"
        2⤵
          PID:2664
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259393110.txt

        Filesize

        1KB

        MD5

        54e0b62cae36238cc9ddb00bef983d01

        SHA1

        81d2356f88e3effad72f426e171822d744994b7a

        SHA256

        b1f2ba4f223c386d7f02651436a67d3f4322183925478fd1deacbd8bd7ef837e

        SHA512

        33448710dc2655de68e2b8b68965216f56d0ff93897e8c39c0e1e1ddf05790d9889f83e34738bacb4a2b37a9d22d16728ff854b1325264f9998eae6abceba744

      • \??\PIPE\srvsvc

        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • memory/2392-8-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

        Filesize

        9.6MB

      • memory/2392-5-0x0000000001D90000-0x0000000001D98000-memory.dmp

        Filesize

        32KB

      • memory/2392-4-0x000000001B700000-0x000000001B9E2000-memory.dmp

        Filesize

        2.9MB

      • memory/2392-9-0x0000000002A70000-0x0000000002AF0000-memory.dmp

        Filesize

        512KB

      • memory/2392-10-0x0000000002A70000-0x0000000002AF0000-memory.dmp

        Filesize

        512KB

      • memory/2392-12-0x0000000002A70000-0x0000000002AF0000-memory.dmp

        Filesize

        512KB

      • memory/2392-14-0x0000000002A30000-0x0000000002A34000-memory.dmp

        Filesize

        16KB

      • memory/2392-7-0x0000000002A70000-0x0000000002AF0000-memory.dmp

        Filesize

        512KB

      • memory/2392-16-0x0000000002A70000-0x0000000002AF0000-memory.dmp

        Filesize

        512KB

      • memory/2392-17-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

        Filesize

        9.6MB

      • memory/2392-6-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

        Filesize

        9.6MB

      • memory/2464-19-0x00000000045D0000-0x00000000045D1000-memory.dmp

        Filesize

        4KB

      • memory/2464-20-0x00000000045D0000-0x00000000045D1000-memory.dmp

        Filesize

        4KB

      • memory/2464-25-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB