Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2024 02:39

General

  • Target

    $_12_/Ufarligheden.ps1

  • Size

    53KB

  • MD5

    81af4fd82b47873584f160fb4228293a

  • SHA1

    656b56b51ec006f0dd660a92a8d270d52ae4fb8d

  • SHA256

    f639169cb559cd1866363100feb43da1b170b708623f45b12c0a706e01561ab6

  • SHA512

    caa807605ec4b51dc27a2e2a5db33818cebc082c84893d6ea0b588a5d1a4bb80f49ce3d5dae96a1baaa25a64420a2455237ae3b1ee8e3765cb99987f775af406

  • SSDEEP

    768:RjrAVpqj8lMfQwOJ0dACRcJPBYIsp8+mIrOvpk7bql3p3ruLcuIxAPTa7uGAoeW9:RvYA8aYYIsp8+5YMOtU3hPTa7eo

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\$_12_\Ufarligheden.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "324" "912"
      2⤵
        PID:2140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259458944.txt

      Filesize

      1KB

      MD5

      87df9f967e0233cffb17cdbe510e1090

      SHA1

      8022efbfb2f8df05069ad8890c519ce04d781ed0

      SHA256

      58fa8c2cfb7a6f057e535d37794b0fbd9ecc5b3a8814f518ee2fa4849a3ffa75

      SHA512

      ea88dd5cff1f54b24cfa23bd1f516daa9e341db4d971d4e1a6acfff7d4978cb7a450b0c15fdef7affff4cec990c1b09f663c2d3fb5f4ca8b5389e119ba27e847

    • memory/324-10-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-6-0x00000000024E0000-0x00000000024E8000-memory.dmp

      Filesize

      32KB

    • memory/324-7-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-8-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-9-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-4-0x000007FEF63DE000-0x000007FEF63DF000-memory.dmp

      Filesize

      4KB

    • memory/324-11-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-12-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-13-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-5-0x000000001B370000-0x000000001B652000-memory.dmp

      Filesize

      2.9MB

    • memory/324-18-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-17-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/324-16-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB