Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
4f0c13bf16b4e53b1513e2b268aec15c6c2a043f88a58dea69c88e25eb920853N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f0c13bf16b4e53b1513e2b268aec15c6c2a043f88a58dea69c88e25eb920853N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Sharpness.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Sharpness.ps1
Resource
win10v2004-20241007-en
General
-
Target
Sharpness.ps1
-
Size
54KB
-
MD5
a455a44aa414354fe74ee543bbf64451
-
SHA1
4d73664950e0b77b2f05eebce4e5c3d549cc18ea
-
SHA256
c7dac58dcad45abf34bee7c7567a746fada583c0e734d204ed2f71617c4b7b31
-
SHA512
a9bedcaa864985c0ec2f9eb521983d23f7b58689922f39305d17fa39aa41ef02be8bec3fc99d22caba1c34c56d6d68160f9dea27bc207eda83f97cc47f852fa7
-
SSDEEP
768:13Zs6XOqDlTXziiIlncM1oM1XgGZstyjmPcWCqqGKmafPMrV4yIAXBMWWYUGrY1b:1K69DF+lcM1tZaGK/QNAxIQsb
Malware Config
Signatures
-
pid Process 1248 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1248 powershell.exe 1248 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1248 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1248 wrote to memory of 3000 1248 powershell.exe 32 PID 1248 wrote to memory of 3000 1248 powershell.exe 32 PID 1248 wrote to memory of 3000 1248 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Sharpness.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1248" "852"2⤵PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56d4e230ab22ff6f31236eb42bbb222e9
SHA1ceecc95943df50d7ffb0c7df2637839ac08daa92
SHA256231b171f1427addbd7bc4881fa49b1dd462d6a37a4b137e17e9dd213f5b5a70f
SHA5126fdfcb4c63b3ec73f75494fae794b0f7a0a9c4684c38bf93e2f89a5ee10f265d9fdb6fbfa7d82f141ce6ce1afbbb9e22e13c614c4cc1199aefabc0a36c500b4b