Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 00:07

General

  • Target

    Dumperfrernes/Multiversities.ps1

  • Size

    52KB

  • MD5

    9f75d1ca6c6a219e26ceea78a6f6b218

  • SHA1

    688f14dea57c5989cdb6b29d2d2f5d6a07a460ef

  • SHA256

    203ef2d3c9984cadb87801dc09f084acf7d6f078855ba6300c6e2da79d3a23e9

  • SHA512

    a337e7288f0ed129ae27357914af9af67080835c2b15cc1000566b39f3a30756b2d9e17c910429ecdda936a0e91608ceffa75725e4f5ef3efb1bf9e6b5b6666e

  • SSDEEP

    768:TgeATHJjJp/klueGBVitBbWB+L2HuuSz35oDFkkSNa9qzgZmuPECvGf72IxJdccu:TQTHLquH7iXo+Vuy3SoaoYuCCJ0cQTB

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Dumperfrernes\Multiversities.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2808" "908"
      2⤵
        PID:2920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259497512.txt

      Filesize

      1KB

      MD5

      6eeaa0af16d32847cd26519a385030ec

      SHA1

      f522518da3bb91002e3a3c203bf6bf15e51f1905

      SHA256

      a3af4f8af30017c6c9edcdd758340d82e6c1894d428b4c7ac07656b218209247

      SHA512

      66b202039ca7ef956ea66a2577a4a7b3b3d52d5bb014847248f771115ee7104f32d8bea1362e21d24c0c524d5674e90b27d0541d652117d39278bdc9f6bb5eeb

    • memory/2808-10-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-12-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-7-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-8-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-9-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-4-0x000007FEF600E000-0x000007FEF600F000-memory.dmp

      Filesize

      4KB

    • memory/2808-11-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-6-0x0000000002370000-0x0000000002378000-memory.dmp

      Filesize

      32KB

    • memory/2808-13-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-17-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-16-0x0000000002840000-0x0000000002844000-memory.dmp

      Filesize

      16KB

    • memory/2808-5-0x000000001B480000-0x000000001B762000-memory.dmp

      Filesize

      2.9MB

    • memory/2808-19-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-18-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB