Analysis

  • max time kernel
    276s
  • max time network
    203s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-10-2024 16:25

General

  • Target

    Snedkererede/Sabbataftenernes.ps1

  • Size

    55KB

  • MD5

    621a941ec0157786a94a49cca0478957

  • SHA1

    266434766d83a9a21bed71f43e606fa1575f8061

  • SHA256

    adcb1457290f388885ca86da1a85e5fa2ac12f5a5c4676968f0ffc948b19afd3

  • SHA512

    6367c3ccd595cd153d866df3b4025563c8382e90bde9e8640eef59dcfabbe78c5f843bbe2f5c267ba9f9f1f9d731493ed4a7ed09054bcad5835dff2edbedc9d5

  • SSDEEP

    1536:EfRLnQNog/e4inTZ3X4VXDTzRjAjLNqdai1MhnzPbqPAQf:eLQNoVZSzhdaie97e

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Snedkererede\Sabbataftenernes.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3620
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3868
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2420
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

    Filesize

    14KB

    MD5

    2c716934288e71380b5c8e36d12b9b68

    SHA1

    b241f84e4b64c2254c29aa411d0661d82614cb41

    SHA256

    a983b9244dffefb0b1e92c0623863aee352e7f2dc9aabc61d64a3221dd438ea1

    SHA512

    8be2a0cdf53edf6a1f5ae2deb145778cfd066b5383d992de238a639835ac4833107ea0b7c6988e4324e0e2ee849ae966645f856dce5b81a67676e01347677ef8

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\JGX6DE9O\www.bing[1].xml

    Filesize

    328B

    MD5

    662f674475f9c3d020031d0e2a275eda

    SHA1

    90b1d7624d8bdd06b10549ce82b7b4f336d6fc4c

    SHA256

    5fedfcd47fc64a6cc17d9c850407810d116290ca143e8684e7edded66f2470b4

    SHA512

    cf7b61dc08ea04560bd453041a2474c8e2af088be9c09e8f1ae2bf5dfefa3216d60f971d5bed6d3fea318a4491b9289215858b2d0728c781335a0ff1c20cf706

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\JGX6DE9O\www.bing[1].xml

    Filesize

    15KB

    MD5

    c8625f60af55734893768989de7daa8b

    SHA1

    4ec074953c598f09c3392e7f14d3a7037b7497be

    SHA256

    fb132fc9940f9bfe4d71fc2ecf8d993c33287b3752a50e0c62b25fa0f6e63707

    SHA512

    5d0f3e9b8bac637b2b6be17726a6fb151b8b91ed67c7bc5df478bb1b4a03231656371cd8e08c7230be1b3806649a1c43ad9c6875c3f27a4a18260c2215c9203d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ek04s1ro.afe.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2420-124-0x00000237EB520000-0x00000237EB620000-memory.dmp

    Filesize

    1024KB

  • memory/2420-125-0x00000237EB460000-0x00000237EB480000-memory.dmp

    Filesize

    128KB

  • memory/2420-215-0x00000237EF0E0000-0x00000237EF1E0000-memory.dmp

    Filesize

    1024KB

  • memory/2420-126-0x00000237DA040000-0x00000237DA060000-memory.dmp

    Filesize

    128KB

  • memory/2420-123-0x00000237DA020000-0x00000237DA040000-memory.dmp

    Filesize

    128KB

  • memory/2420-82-0x00000237EB200000-0x00000237EB300000-memory.dmp

    Filesize

    1024KB

  • memory/2420-59-0x00000237D9770000-0x00000237D9870000-memory.dmp

    Filesize

    1024KB

  • memory/2420-50-0x00000237B7E00000-0x00000237B7F00000-memory.dmp

    Filesize

    1024KB

  • memory/2420-43-0x00000237B7F00000-0x00000237B8000000-memory.dmp

    Filesize

    1024KB

  • memory/2420-44-0x00000237B7F00000-0x00000237B8000000-memory.dmp

    Filesize

    1024KB

  • memory/2420-42-0x00000237B7F00000-0x00000237B8000000-memory.dmp

    Filesize

    1024KB

  • memory/3620-19-0x00007FFE47C30000-0x00007FFE486F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3620-18-0x00007FFE47C30000-0x00007FFE486F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3620-17-0x00007FFE47C30000-0x00007FFE486F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3620-0-0x00007FFE47C33000-0x00007FFE47C35000-memory.dmp

    Filesize

    8KB

  • memory/3620-15-0x00007FFE47C30000-0x00007FFE486F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3620-12-0x00007FFE47C30000-0x00007FFE486F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3620-14-0x0000021EC0A00000-0x0000021EC0A24000-memory.dmp

    Filesize

    144KB

  • memory/3620-11-0x00007FFE47C30000-0x00007FFE486F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3620-13-0x0000021EC0A00000-0x0000021EC0A2A000-memory.dmp

    Filesize

    168KB

  • memory/3620-10-0x00007FFE47C30000-0x00007FFE486F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3620-3-0x0000021EC0840000-0x0000021EC0862000-memory.dmp

    Filesize

    136KB