Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 09:48

General

  • Target

    Otelcosis/Makabreres.ps1

  • Size

    51KB

  • MD5

    7813853161f7340e47a87cdbdfd3a56d

  • SHA1

    830361f5c97f811af32b9b6ffa4aecaf69ea3ceb

  • SHA256

    b78167a2812a5b68085e363f88ddacc193f2a311f6ca4ff961a4eb79dbea218b

  • SHA512

    b895170e7e4568f9e73435101741a56da226a87371b3bda4a098d7e7af974341e3726fbab56a69eb6ec241351832c7d023008473d44daaaa1768626b670be418

  • SSDEEP

    1536:vyuQkJAQQIN073zKXaIvh49RvHcQ3V4/M2LBpn5nViS:auIQQIS73O1vhUvKnViS

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Otelcosis\Makabreres.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2008" "856"
      2⤵
        PID:2204

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259459033.txt

      Filesize

      1KB

      MD5

      c77180d3f844080efcc5ff5d87d6d322

      SHA1

      4e315ef5a94ab54182ecc767d3c830cdb9b8acb8

      SHA256

      91571a693a32061eea7358f3f5e39c08fd176ea10d4bd161299956eba37ce93e

      SHA512

      c84e032bab2845f515fcc1216bc9d57f0f8cdae6cd3c71a1fad5ad2d470be812047e78ce05da98e08a3d594cbbbe78fe8125b506ece9599e23b5ce6553646af7

    • memory/2008-9-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-6-0x0000000002250000-0x0000000002258000-memory.dmp

      Filesize

      32KB

    • memory/2008-7-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-8-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-10-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-4-0x000007FEF630E000-0x000007FEF630F000-memory.dmp

      Filesize

      4KB

    • memory/2008-11-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-12-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-13-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-5-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

      Filesize

      2.9MB

    • memory/2008-16-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2008-17-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

      Filesize

      9.6MB