Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
rCommercialoffer_Technicaloffer_pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rCommercialoffer_Technicaloffer_pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Tablespoonsful/Hpital.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Tablespoonsful/Hpital.ps1
Resource
win10v2004-20241007-en
General
-
Target
Tablespoonsful/Hpital.ps1
-
Size
55KB
-
MD5
5c3047a848544b49eb82d09ed58708f3
-
SHA1
27c59daa34a25319f77d2dfe91613a4669803e21
-
SHA256
72a4194d8fcae2e4cfa2bd19dda030d1a7a05f27b2cc5197b6fceffb6b9decf0
-
SHA512
d783fa64387306adc639d5051bb153c5437ceeb1dc5abbd71d28cd2e1019209b13e1188bc94ab0ebe14cb94daba838293592361ea29451695f41d995b08c3e6a
-
SSDEEP
1536:QPchwSZoEGZC7CeFKFtsBYcmPuhjywMaJzzivfkIYFPixSk6aVM:WchwS/GZMFEMBthiaQvYJg6a6
Malware Config
Signatures
-
pid Process 1660 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1660 powershell.exe 1660 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1660 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1440 1660 powershell.exe 32 PID 1660 wrote to memory of 1440 1660 powershell.exe 32 PID 1660 wrote to memory of 1440 1660 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Tablespoonsful\Hpital.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1660" "864"2⤵PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53e6bfd24310a4f633a0570a93fa5a2a3
SHA14a6cb35a981f69fc740f3f949f4a27d9ecb6624f
SHA2563b662e990d77cd84850ceee60949b9e2de29d861f05d060fea647c1415408c9a
SHA5129055b482df56af6dfb9b3a280bc338f257a2baf68e6a64b167004d2ff340f7bfed7089da8c717275088d7e03f4857e42f22f4e36d49d42343d342fa6573a34b0