Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
5e0c5d2342ce0c3460d6c853a64efc16a89b9fe93372334d78163dfe7efb7e12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e0c5d2342ce0c3460d6c853a64efc16a89b9fe93372334d78163dfe7efb7e12.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Tablespoonsful/Hpital.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Tablespoonsful/Hpital.ps1
Resource
win10v2004-20241007-en
General
-
Target
Tablespoonsful/Hpital.ps1
-
Size
55KB
-
MD5
5c3047a848544b49eb82d09ed58708f3
-
SHA1
27c59daa34a25319f77d2dfe91613a4669803e21
-
SHA256
72a4194d8fcae2e4cfa2bd19dda030d1a7a05f27b2cc5197b6fceffb6b9decf0
-
SHA512
d783fa64387306adc639d5051bb153c5437ceeb1dc5abbd71d28cd2e1019209b13e1188bc94ab0ebe14cb94daba838293592361ea29451695f41d995b08c3e6a
-
SSDEEP
1536:QPchwSZoEGZC7CeFKFtsBYcmPuhjywMaJzzivfkIYFPixSk6aVM:WchwS/GZMFEMBthiaQvYJg6a6
Malware Config
Signatures
-
pid Process 2168 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 powershell.exe 2168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2168 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2944 2168 powershell.exe 33 PID 2168 wrote to memory of 2944 2168 powershell.exe 33 PID 2168 wrote to memory of 2944 2168 powershell.exe 33
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Tablespoonsful\Hpital.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2168" "848"2⤵PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53b739f1f027fe7fd2d278159121a9f56
SHA1419ddcda737ee2e2a92e8a5c2e0bcbbda9be845f
SHA256062344bc3d22ff5cca5a66a9b733985537bdd5e75583b6d6fc999b31cde47223
SHA5121862cbc27efea2780f33ba5ee5f316bd35ab3b5c85bdb01927568f606e0d301fd14cba61ef85f94f1719ace99ef83423af87d90e248d44e47800ce9ccb7ac64e