Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/10/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
Justificante.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Justificante.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Jobation.ps1
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Jobation.ps1
Resource
win10v2004-20241007-en
General
-
Target
Jobation.ps1
-
Size
51KB
-
MD5
faace62892757e3f6b6bcdc07c3b75e0
-
SHA1
1b0bcaaaf1c6b3aeaee3a7eef36f0a1776fb654b
-
SHA256
6492bacab0fd62ad56b0c444c325f727653725a87fc221e2bb6baf8d56490f89
-
SHA512
12f0d38ee61532c33c3618525163ed79bb5e51d21cb0d3e35db98b1b4e1cbb42b3569682b2cdd869592c8649e6e83a49e777704980bb207d9790692e59682bbc
-
SSDEEP
768:Ete4F3/yydoeEGZgA55Gosv5DC8YVeUB3n1oiNgS3V0ORNfBaAVUjJF7PloejYSx:E3F3HdfN/PUQnaiqI0WBt2FZo9SVs2
Malware Config
Signatures
-
pid Process 1680 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1680 powershell.exe 1680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2528 1680 powershell.exe 31 PID 1680 wrote to memory of 2528 1680 powershell.exe 31 PID 1680 wrote to memory of 2528 1680 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Jobation.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1680" "856"2⤵PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ae43cd61a55a225fdb43fb7a5f119a79
SHA182f1bb9bcffe3b0edab7c42eea8ba6e7c801acb4
SHA256e721a2cbc561ae744c9401f22444ecdf457de19716363a28ce5bdb95bb48c0c7
SHA512cdd057038b3da5b4ff672c0aeb6ee59ae24c4215f7628881ced601492fb82dcffd070be7d8e7ca0e5c550850cd0ef618f8fbbc702b284fbc148858b40bf23095