Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/10/2024, 14:22

General

  • Target

    Jobation.ps1

  • Size

    51KB

  • MD5

    faace62892757e3f6b6bcdc07c3b75e0

  • SHA1

    1b0bcaaaf1c6b3aeaee3a7eef36f0a1776fb654b

  • SHA256

    6492bacab0fd62ad56b0c444c325f727653725a87fc221e2bb6baf8d56490f89

  • SHA512

    12f0d38ee61532c33c3618525163ed79bb5e51d21cb0d3e35db98b1b4e1cbb42b3569682b2cdd869592c8649e6e83a49e777704980bb207d9790692e59682bbc

  • SSDEEP

    768:Ete4F3/yydoeEGZgA55Gosv5DC8YVeUB3n1oiNgS3V0ORNfBaAVUjJF7PloejYSx:E3F3HdfN/PUQnaiqI0WBt2FZo9SVs2

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Jobation.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1680" "856"
      2⤵
        PID:2528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259436959.txt

      Filesize

      1KB

      MD5

      ae43cd61a55a225fdb43fb7a5f119a79

      SHA1

      82f1bb9bcffe3b0edab7c42eea8ba6e7c801acb4

      SHA256

      e721a2cbc561ae744c9401f22444ecdf457de19716363a28ce5bdb95bb48c0c7

      SHA512

      cdd057038b3da5b4ff672c0aeb6ee59ae24c4215f7628881ced601492fb82dcffd070be7d8e7ca0e5c550850cd0ef618f8fbbc702b284fbc148858b40bf23095

    • memory/1680-11-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-7-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-6-0x0000000001E80000-0x0000000001E88000-memory.dmp

      Filesize

      32KB

    • memory/1680-8-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-9-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-4-0x000007FEF538E000-0x000007FEF538F000-memory.dmp

      Filesize

      4KB

    • memory/1680-10-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-12-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-13-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-17-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-16-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-5-0x000000001B510000-0x000000001B7F2000-memory.dmp

      Filesize

      2.9MB