Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 12:36

General

  • Target

    Biggings148/Soranere.ps1

  • Size

    54KB

  • MD5

    45a45d4ca67207bba6b7c59f4516279d

  • SHA1

    3b366b1fb6a9e042c37162c8173f51a6b3690650

  • SHA256

    76a1abb4c1bea47aeda60dffe2c54b786dd79574a04f2267fa771ceb968d1cb5

  • SHA512

    ac0fc5884b44b0e0257545b36410e31de3542374872780b831cb0440cdab8759e7c40ba67ec542978a32aecd372ea72766b1e1ace321a4e9793757e862cd8076

  • SSDEEP

    1536:jE21LD6iMX98cWySJec5W2Q7oKzOraaeSo0:Y8eik1oec5a0sOrNeSo0

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Biggings148\Soranere.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2668" "848"
      2⤵
        PID:2676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259419956.txt

      Filesize

      1KB

      MD5

      04f6b7394ff89537df391ec3d2550445

      SHA1

      6826843311cd39864cd96dd7aa4a5d4e1387d34a

      SHA256

      72a4e7742f8d8ced556082a7f217869711a02bef43cc177b9e8ef29e3f840dec

      SHA512

      bc175bf84059b4585142b500b66e5f50020327c38a08c6c6dacd04f3e26056ae4744a8bfa7e5665966277a53083ea39700972e7e919c93c9ac8d3de9173b50b8

    • memory/2668-10-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-6-0x0000000002A50000-0x0000000002A58000-memory.dmp

      Filesize

      32KB

    • memory/2668-7-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-8-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-9-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-4-0x000007FEF5BEE000-0x000007FEF5BEF000-memory.dmp

      Filesize

      4KB

    • memory/2668-11-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-12-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-13-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-5-0x000000001B670000-0x000000001B952000-memory.dmp

      Filesize

      2.9MB

    • memory/2668-16-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-17-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB