Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 01:23

General

  • Target

    $WINDIR/compromis/overcheaply.ps1

  • Size

    54KB

  • MD5

    5700ab6572287746a87ecdba691baf79

  • SHA1

    5885062f3e65fe332bcf2077bc25323139e60b18

  • SHA256

    e3916adcdcff1f166a6bcd0487b2d725131d275190459841dcd77d869e8f707a

  • SHA512

    7a95bb5aee211653b556da9416709d418c77600c561ed7b5af11b559d5052170b2c93ef8e1c70e14536da01b6ac050f5feba81d04784f232cf54ad92db70b106

  • SSDEEP

    1536:wdIUK0a2UebWv67ZY3xMxevI7EtHVO3ojPoTtnVnkC:wdIU1Edv67G3x2XEtH03SPytZ

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\$WINDIR\compromis\overcheaply.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2368" "852"
      2⤵
        PID:2864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259447677.txt

      Filesize

      1KB

      MD5

      9096980df9a10b378afa1bb59f998554

      SHA1

      aa0b77ea0309565df588edd4891eab610a2b9181

      SHA256

      4024733b17005a9cbcaa4df337327d0c250e15e64b4118ce1b280d4f4a5fab1f

      SHA512

      77feebf304d8846c9f94f357b6267bfecaf2de4443cb6e76dee2d274cb5069c1771dde092582937b4a68d4daf75c2cddab9b8980f0556a46cfd522387fb9a359

    • memory/2368-11-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-7-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-6-0x0000000002340000-0x0000000002348000-memory.dmp

      Filesize

      32KB

    • memory/2368-8-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-9-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-4-0x000007FEF5C8E000-0x000007FEF5C8F000-memory.dmp

      Filesize

      4KB

    • memory/2368-10-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-12-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-13-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-5-0x000000001B640000-0x000000001B922000-memory.dmp

      Filesize

      2.9MB

    • memory/2368-16-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/2368-17-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB