Analysis

  • max time kernel
    16s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 20:21

General

  • Target

    Sharpness.ps1

  • Size

    54KB

  • MD5

    a455a44aa414354fe74ee543bbf64451

  • SHA1

    4d73664950e0b77b2f05eebce4e5c3d549cc18ea

  • SHA256

    c7dac58dcad45abf34bee7c7567a746fada583c0e734d204ed2f71617c4b7b31

  • SHA512

    a9bedcaa864985c0ec2f9eb521983d23f7b58689922f39305d17fa39aa41ef02be8bec3fc99d22caba1c34c56d6d68160f9dea27bc207eda83f97cc47f852fa7

  • SSDEEP

    768:13Zs6XOqDlTXziiIlncM1oM1XgGZstyjmPcWCqqGKmafPMrV4yIAXBMWWYUGrY1b:1K69DF+lcM1tZaGK/QNAxIQsb

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Sharpness.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1248" "852"
      2⤵
        PID:3000

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259450033.txt

            Filesize

            1KB

            MD5

            6d4e230ab22ff6f31236eb42bbb222e9

            SHA1

            ceecc95943df50d7ffb0c7df2637839ac08daa92

            SHA256

            231b171f1427addbd7bc4881fa49b1dd462d6a37a4b137e17e9dd213f5b5a70f

            SHA512

            6fdfcb4c63b3ec73f75494fae794b0f7a0a9c4684c38bf93e2f89a5ee10f265d9fdb6fbfa7d82f141ce6ce1afbbb9e22e13c614c4cc1199aefabc0a36c500b4b

          • memory/1248-9-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-6-0x0000000002A60000-0x0000000002A68000-memory.dmp

            Filesize

            32KB

          • memory/1248-7-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-11-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-10-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-4-0x000007FEF5EAE000-0x000007FEF5EAF000-memory.dmp

            Filesize

            4KB

          • memory/1248-8-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-12-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-13-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-16-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB

          • memory/1248-5-0x000000001B640000-0x000000001B922000-memory.dmp

            Filesize

            2.9MB

          • memory/1248-17-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

            Filesize

            9.6MB