Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/10/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Jobation.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Jobation.ps1
Resource
win10v2004-20241007-en
General
-
Target
Jobation.ps1
-
Size
51KB
-
MD5
faace62892757e3f6b6bcdc07c3b75e0
-
SHA1
1b0bcaaaf1c6b3aeaee3a7eef36f0a1776fb654b
-
SHA256
6492bacab0fd62ad56b0c444c325f727653725a87fc221e2bb6baf8d56490f89
-
SHA512
12f0d38ee61532c33c3618525163ed79bb5e51d21cb0d3e35db98b1b4e1cbb42b3569682b2cdd869592c8649e6e83a49e777704980bb207d9790692e59682bbc
-
SSDEEP
768:Ete4F3/yydoeEGZgA55Gosv5DC8YVeUB3n1oiNgS3V0ORNfBaAVUjJF7PloejYSx:E3F3HdfN/PUQnaiqI0WBt2FZo9SVs2
Malware Config
Signatures
-
pid Process 2640 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2640 powershell.exe 2640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2640 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2768 2640 powershell.exe 31 PID 2640 wrote to memory of 2768 2640 powershell.exe 31 PID 2640 wrote to memory of 2768 2640 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Jobation.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2640" "860"2⤵PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e5a306aeac524e1cfc59620e533f6033
SHA1c9ce5e1d3973134de833c268a5b84a99026a13a6
SHA256c3c3011b8055e797e95e733622c3f2964c87a976da0e33dd888a0903d5c2b45d
SHA512b8b55a8bb0d09975a4a4f66ce4460f09a94d60ce9f16645c33efeb3dcc07714a4cc4f76bed3bbd70f637167208038f0357480eb6beec9b944881682c05de788d