Analysis

  • max time kernel
    133s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 01:37

General

  • Target

    Hingstplag/Derogatory/Obstinative/Stinkdyrene/Usikkerhedsmomenterne.ps1

  • Size

    58KB

  • MD5

    f75f469413f7ee4a1aa5684598b21dc2

  • SHA1

    9ced6780f56759a64019fb90f02323382b7d37b8

  • SHA256

    995bc94d2131edcae86c7d3f939a54a0f75f48eceee27633a43a502f4c3d4c21

  • SHA512

    19a0745c7ce6a2294fcf9de80996dc7e2898401f69f88d7f1373d718655bcfbb0fec04585dddce0971d5a3acf339ed9e64a3d9783d221dbaec5ac3347b42b568

  • SSDEEP

    1536:Yl/yZLz7GcmZf1ae0zqow0gP/o7GTKmnH:Yl/Ozqcmd9/w7GzH

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Hingstplag\Derogatory\Obstinative\Stinkdyrene\Usikkerhedsmomenterne.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:2960
      • C:\Windows\system32\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "2768" "1084"
        2⤵
          PID:2396
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259399866.txt

        Filesize

        1KB

        MD5

        561b94a7020059af5217ba23c73d159b

        SHA1

        245745315e3e35291afd1105c1a9131ccf98b7f3

        SHA256

        06fc086e8fcf645f79078af7e49bc122e0473ecea3521fd27bbadd8367a7ece1

        SHA512

        ae960184d9653ae0ae9f014ad4d2edc8a0f1a111fd43f744575b29867d9a85433cc495909b95b32bcdf0762f3a08a57a26bae0b11966129069e6a43545d5a40d

      • memory/2572-21-0x0000000002A20000-0x0000000002A30000-memory.dmp

        Filesize

        64KB

      • memory/2768-6-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

        Filesize

        32KB

      • memory/2768-4-0x000007FEF5EAE000-0x000007FEF5EAF000-memory.dmp

        Filesize

        4KB

      • memory/2768-8-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-9-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-10-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-11-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-13-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-7-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-17-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-16-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2768-5-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

        Filesize

        2.9MB