Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 09:45

General

  • Target

    Otelcosis/Makabreres.ps1

  • Size

    51KB

  • MD5

    7813853161f7340e47a87cdbdfd3a56d

  • SHA1

    830361f5c97f811af32b9b6ffa4aecaf69ea3ceb

  • SHA256

    b78167a2812a5b68085e363f88ddacc193f2a311f6ca4ff961a4eb79dbea218b

  • SHA512

    b895170e7e4568f9e73435101741a56da226a87371b3bda4a098d7e7af974341e3726fbab56a69eb6ec241351832c7d023008473d44daaaa1768626b670be418

  • SSDEEP

    1536:vyuQkJAQQIN073zKXaIvh49RvHcQ3V4/M2LBpn5nViS:auIQQIS73O1vhUvKnViS

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Otelcosis\Makabreres.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2508" "856"
      2⤵
        PID:2496

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259436592.txt

      Filesize

      1KB

      MD5

      76e4718e2a2142128f6ad61887fc994d

      SHA1

      f9bc71cf8be2460a6faf5cb57732278f211b20b5

      SHA256

      149d91f111cbc2e6c77020ff77d7a070727f6554f3c958de5996b6375dd2caf5

      SHA512

      64db6b6fc12e7dd1bcadef8e967dd9ea08829f1c1c332206db0c46a58f66bd0ff04c854dc4a83c543c6098c1da9f1ebcefeb9ef3631c0e7d0c8edbcec9e82f26

    • memory/2508-10-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-6-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB

    • memory/2508-7-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-8-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-9-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-4-0x000007FEF587E000-0x000007FEF587F000-memory.dmp

      Filesize

      4KB

    • memory/2508-11-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-13-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-12-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-5-0x000000001B790000-0x000000001BA72000-memory.dmp

      Filesize

      2.9MB

    • memory/2508-16-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2508-17-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

      Filesize

      9.6MB