Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2024, 01:26

General

  • Target

    Haarvksten/Nomenklaturerne.ps1

  • Size

    53KB

  • MD5

    67517d72ac10b11f81aa07fc2f994275

  • SHA1

    71d255f09b46f34093786eec160120e6383b2f8c

  • SHA256

    0af4117e1ded224818ab4c741022f2179af74cc0cf9fcc640efb73746baf4fe4

  • SHA512

    1c1054233b654d8831c114b0f009a095a49c8805b13a2d756e5eedec477cddb2608ed0012b040a8736916e3226a5aebb4425eb6f3ee02e4338afe9816b923afe

  • SSDEEP

    768:GTPdZlcIXV5loyDhTeT2qroJOgR08h5IhTviGxm83oq/VHDpbnVHxDy0V0DoinD2:GTlrcslmrrfS5IBiG+eJhr6/nA3l

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Haarvksten\Nomenklaturerne.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2568" "872"
      2⤵
        PID:1248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259429699.txt

      Filesize

      1KB

      MD5

      4732408b2bb9d8afd616da214257832c

      SHA1

      514c95f45ee35b61c12d491c9a74cb523c48d63c

      SHA256

      7575fcfcd4d904b0d2d4d35c55ba41d7627c9cb20704bebbae95c27b5a02d265

      SHA512

      6f2f29507b3ca6d471360d084eb80fc3d9fc142834b16dce59f5b628167e044a6ea0294fc761e0ffdf79a4dab9ec32b3440bbe7a6c2563e67db130a7d9e5446e

    • memory/2568-10-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-8-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-7-0x0000000001D90000-0x0000000001D98000-memory.dmp

      Filesize

      32KB

    • memory/2568-6-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-9-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-4-0x000007FEF540E000-0x000007FEF540F000-memory.dmp

      Filesize

      4KB

    • memory/2568-11-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-13-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-12-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-5-0x000000001B750000-0x000000001BA32000-memory.dmp

      Filesize

      2.9MB

    • memory/2568-16-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB

    • memory/2568-17-0x000007FEF5150000-0x000007FEF5AED000-memory.dmp

      Filesize

      9.6MB