Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 13:28

General

  • Target

    $WINDIR/compromis/overcheaply.ps1

  • Size

    54KB

  • MD5

    5700ab6572287746a87ecdba691baf79

  • SHA1

    5885062f3e65fe332bcf2077bc25323139e60b18

  • SHA256

    e3916adcdcff1f166a6bcd0487b2d725131d275190459841dcd77d869e8f707a

  • SHA512

    7a95bb5aee211653b556da9416709d418c77600c561ed7b5af11b559d5052170b2c93ef8e1c70e14536da01b6ac050f5feba81d04784f232cf54ad92db70b106

  • SSDEEP

    1536:wdIUK0a2UebWv67ZY3xMxevI7EtHVO3ojPoTtnVnkC:wdIU1Edv67G3x2XEtH03SPytZ

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\$WINDIR\compromis\overcheaply.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "3016" "856"
      2⤵
        PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259424275.txt

      Filesize

      1KB

      MD5

      5f5c1baa6c17495fd2b074b24c8088a6

      SHA1

      64fe21c8fae18a67fb80b6c9f75c0777cc8a967d

      SHA256

      aef37e33b38036ce46bfa585c318bae4b4069b5a9761fa2e509bcb1b665a681d

      SHA512

      adcfc3fe1b8bc60dca78bb26cc91d596ce24d659f030b7e6a36572d979ace27bc6e942cfbe70fa96d62febfca6f24991f12d1122b14104bc28750fde2a6efcd1

    • memory/3016-10-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-6-0x0000000002890000-0x0000000002898000-memory.dmp

      Filesize

      32KB

    • memory/3016-7-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-8-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-9-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-4-0x000007FEF5EBE000-0x000007FEF5EBF000-memory.dmp

      Filesize

      4KB

    • memory/3016-11-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-13-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-12-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-5-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

      Filesize

      2.9MB

    • memory/3016-17-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-16-0x000007FEF5C00000-0x000007FEF659D000-memory.dmp

      Filesize

      9.6MB