Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 02:16

General

  • Target

    Biggings148/Soranere.ps1

  • Size

    54KB

  • MD5

    45a45d4ca67207bba6b7c59f4516279d

  • SHA1

    3b366b1fb6a9e042c37162c8173f51a6b3690650

  • SHA256

    76a1abb4c1bea47aeda60dffe2c54b786dd79574a04f2267fa771ceb968d1cb5

  • SHA512

    ac0fc5884b44b0e0257545b36410e31de3542374872780b831cb0440cdab8759e7c40ba67ec542978a32aecd372ea72766b1e1ace321a4e9793757e862cd8076

  • SSDEEP

    1536:jE21LD6iMX98cWySJec5W2Q7oKzOraaeSo0:Y8eik1oec5a0sOrNeSo0

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Biggings148\Soranere.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2340" "864"
      2⤵
        PID:2292

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259435749.txt

      Filesize

      1KB

      MD5

      cd3a4f3a12691c19ada6b51bea9d7011

      SHA1

      d8d367d279aeedc1af55d67e008dfd5f65508fab

      SHA256

      5d9de55d6a72b2755cef627c743a957e0184f35847126a28131a9a15f823441c

      SHA512

      d71a136226d82e984e5df1c2b2188b2dcfe65ed9fa606ea53fed9a52faf2404ab9a7ac9c9dc8a98ba6e982025623895378943ea1a48801973decd67db260236d

    • memory/2340-4-0x000007FEF5BFE000-0x000007FEF5BFF000-memory.dmp

      Filesize

      4KB

    • memory/2340-5-0x000000001B6A0000-0x000000001B982000-memory.dmp

      Filesize

      2.9MB

    • memory/2340-6-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-8-0x00000000022D0000-0x00000000022D8000-memory.dmp

      Filesize

      32KB

    • memory/2340-7-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-9-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-10-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-11-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-12-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-13-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-16-0x000007FEF5940000-0x000007FEF62DD000-memory.dmp

      Filesize

      9.6MB