Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
PO 20241325-SQ20240002189 (revised-3) Quotation______________________________________________.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO 20241325-SQ20240002189 (revised-3) Quotation______________________________________________.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Saganashes.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Saganashes.ps1
Resource
win10v2004-20241007-en
General
-
Target
Saganashes.ps1
-
Size
51KB
-
MD5
86971efe48eae4401b734e86152c12aa
-
SHA1
93376b7df5fa9f5d363e263dd898b86e42e40ec0
-
SHA256
8e626d6dc0bb24ed272eaec732b70f81e306c38eba28df9e96ce78d61a75e455
-
SHA512
a04489dfa81e2fe20f1a8f07c562ed4a05f85b74d5745d6cb712252a46f997a7de6c9f11c3fa902c7c7b03f6ff8596e89e064c251b6a348dfb0d3b7ff6a02455
-
SSDEEP
768:AN4iitGvtxOdn/KpRVkmzfjoAPPSQJorIsqd1d4FdJF9wBYExO4u5lwSnuzC:C6o7kn/KdHdf2rtC1d42BYExOT5lwQ
Malware Config
Signatures
-
pid Process 2732 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2732 powershell.exe 2732 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2732 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2836 2732 powershell.exe 31 PID 2732 wrote to memory of 2836 2732 powershell.exe 31 PID 2732 wrote to memory of 2836 2732 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Saganashes.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2732" "860"2⤵PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55625ef88190856f056abc9a9b8530e15
SHA16eec0c47f677f9668518cb5b6b297d4b7a8a4aca
SHA256581ad56737979ad015af04c0016f0957004745c96f3e89ef71102789ebe40185
SHA5125b97371f8bde5d9dacebf0de5cc3ac600dfddabcb13d0101f078cb0f96d1e2fb89ba7611082454a27dfd6192adac5815179024eee68680f5a046d5a66f4a2941