Analysis

  • max time kernel
    13s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2024 03:27

General

  • Target

    Fortrinsrettighedens/Kildesprogenes.ps1

  • Size

    54KB

  • MD5

    3f03617943c93785889b0b33151afd75

  • SHA1

    1358c716ba802fdb105b160a8895f0b9d6fb8770

  • SHA256

    dce53a205e1cdd0938ec514c4ee631101130e98dd0019e2a200c6eed4491a8d8

  • SHA512

    e90d83751d66c922814f0bceda63f498becdaf1216ff659a2835a16eacb1a361d924a7689c78bbdeacac47f993775d5b445eaecd4d31373b70921c9eaebc026f

  • SSDEEP

    1536:q46f+46iraJfbkp6LOqSm5cQYX6GQ4Jy7rUXR9WEnz:qy0ryfbc6LxSm5cfX6GQ4J3jt

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Fortrinsrettighedens\Kildesprogenes.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2244" "912"
      2⤵
        PID:2864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259529653.txt

      Filesize

      1KB

      MD5

      3e208051c3fefb31f7d870f21c15e4ca

      SHA1

      7c9850942b65a851edac933b06808132fe893537

      SHA256

      2175ca905e3c029b34e769b8c1e678f4df254edc6a862423e52d8ffca39632fe

      SHA512

      1df0140be40bde7467637c9cd531dfbe84082abb2e62b940e58c4b5a1cbc2719360187ceefbda3cddefb93caf37018e8fad707a8779d1b381d11058538c00301

    • memory/2244-12-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-13-0x000007FEF5E1E000-0x000007FEF5E1F000-memory.dmp

      Filesize

      4KB

    • memory/2244-7-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-8-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-9-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-10-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-6-0x0000000002630000-0x0000000002638000-memory.dmp

      Filesize

      32KB

    • memory/2244-4-0x000007FEF5E1E000-0x000007FEF5E1F000-memory.dmp

      Filesize

      4KB

    • memory/2244-11-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-14-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-15-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-16-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-5-0x000000001B410000-0x000000001B6F2000-memory.dmp

      Filesize

      2.9MB

    • memory/2244-19-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2244-20-0x000007FEF5B60000-0x000007FEF64FD000-memory.dmp

      Filesize

      9.6MB