Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 02:30

General

  • Target

    Laryngectomize/Listeprisernes.ps1

  • Size

    53KB

  • MD5

    e4f72073cc7b121ef1e77875b5c3aa40

  • SHA1

    eb3ace1b3dd416dbcdec1ae6a1ee3d20227ae6fd

  • SHA256

    0a8ab46fd80e222c9f3e2ec4cf38c67ae7adf4f09e40709bbba2c2e3ee785f43

  • SHA512

    662b9d35f71c99eea7187332363de7d6ea3ab54e1e6b0800f2162b6984949fdf7bebecf26d8db89a9438e532a2d2229a5110b201d814a1853d851f229065306a

  • SSDEEP

    1536:ElXR51ki9AdNwV/NK2HnznYzlt+UY8vECtZfk4:0rzeTC//LYzltb6eZ84

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Laryngectomize\Listeprisernes.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2148" "852"
      2⤵
        PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259459960.txt

      Filesize

      1KB

      MD5

      cb122ee6722c6dbf950a3267471cf1a6

      SHA1

      0705eb584b78c8fc5a5c1335a9452cac612c5b50

      SHA256

      ad5bcb5021b595546831cce9fe47c32f56827b375ff0af0819447cd149375b68

      SHA512

      9297e9f7243917690698203a9f8e0f4f8b7d619e016b72cbdb914695c1fe3b1123affccccaf5c2f25a69e4dfbaecf1cf9e9c4c2e81f3a7a2e4bc584ffbe8eca7

    • memory/2148-4-0x000007FEF5E7E000-0x000007FEF5E7F000-memory.dmp

      Filesize

      4KB

    • memory/2148-5-0x000000001B680000-0x000000001B962000-memory.dmp

      Filesize

      2.9MB

    • memory/2148-6-0x00000000022D0000-0x00000000022D8000-memory.dmp

      Filesize

      32KB

    • memory/2148-7-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

      Filesize

      9.6MB

    • memory/2148-8-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

      Filesize

      9.6MB

    • memory/2148-9-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

      Filesize

      9.6MB

    • memory/2148-10-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

      Filesize

      9.6MB

    • memory/2148-13-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

      Filesize

      9.6MB

    • memory/2148-14-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

      Filesize

      9.6MB