Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
cb58bf810026a8ee8a4e7dda3a23369f4f3a1170e97010cd45b698dc412a4b4b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cb58bf810026a8ee8a4e7dda3a23369f4f3a1170e97010cd45b698dc412a4b4b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$_12_/Ufarligheden.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$_12_/Ufarligheden.ps1
Resource
win10v2004-20241007-en
General
-
Target
$_12_/Ufarligheden.ps1
-
Size
53KB
-
MD5
81af4fd82b47873584f160fb4228293a
-
SHA1
656b56b51ec006f0dd660a92a8d270d52ae4fb8d
-
SHA256
f639169cb559cd1866363100feb43da1b170b708623f45b12c0a706e01561ab6
-
SHA512
caa807605ec4b51dc27a2e2a5db33818cebc082c84893d6ea0b588a5d1a4bb80f49ce3d5dae96a1baaa25a64420a2455237ae3b1ee8e3765cb99987f775af406
-
SSDEEP
768:RjrAVpqj8lMfQwOJ0dACRcJPBYIsp8+mIrOvpk7bql3p3ruLcuIxAPTa7uGAoeW9:RvYA8aYYIsp8+5YMOtU3hPTa7eo
Malware Config
Signatures
-
pid Process 324 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 324 powershell.exe 324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 324 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 324 wrote to memory of 2140 324 powershell.exe 32 PID 324 wrote to memory of 2140 324 powershell.exe 32 PID 324 wrote to memory of 2140 324 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\$_12_\Ufarligheden.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "324" "912"2⤵PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD587df9f967e0233cffb17cdbe510e1090
SHA18022efbfb2f8df05069ad8890c519ce04d781ed0
SHA25658fa8c2cfb7a6f057e535d37794b0fbd9ecc5b3a8814f518ee2fa4849a3ffa75
SHA512ea88dd5cff1f54b24cfa23bd1f516daa9e341db4d971d4e1a6acfff7d4978cb7a450b0c15fdef7affff4cec990c1b09f663c2d3fb5f4ca8b5389e119ba27e847