Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f8b3078e40bcfcd0c464054ab5d942bff72aa8c27aa6cf9838dd2daaac854caa.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f8b3078e40bcfcd0c464054ab5d942bff72aa8c27aa6cf9838dd2daaac854caa.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Saccate/Chiriguano.ps1
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Saccate/Chiriguano.ps1
Resource
win10v2004-20241007-en
General
-
Target
Saccate/Chiriguano.ps1
-
Size
51KB
-
MD5
6c30e6cb99e14b8e5446a9a5726167ed
-
SHA1
01d799ef731cf409d29a51696fd3380b296f8730
-
SHA256
3a0443fe99e0be036a5747d6c6a4a0202f5f55ffb8a338af90f829d8bbf5d5f6
-
SHA512
39358a6fa774429954c0a599f55685608220eabeef19b6c9be1040169b65577d51c9306d537a248779a79b092e820fef7e9ee4f256297434c3677be7f75b8696
-
SSDEEP
1536:kVpjFOKIF51+UTMIKwoQTOxBrlGtGfZWShL+m:sFO1FChNBg5EL+m
Malware Config
Signatures
-
pid Process 1936 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 powershell.exe 1936 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1936 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2720 1936 powershell.exe 30 PID 1936 wrote to memory of 2720 1936 powershell.exe 30 PID 1936 wrote to memory of 2720 1936 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Saccate\Chiriguano.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1936" "852"2⤵PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD567661e396a0ab7e81275a27a0fd37dcc
SHA143f7657ad30a70a09aa0296004a7eb1f38eaea8b
SHA2567471722d4c188a5039f74401791cf6f47b3cb81aedffa24e0c22aa025ac308de
SHA5124861978ef3ac25cd320c774ee26410930a4421f6b57bed095ce8a8c0c633060a3790e4d1864436cc8c74c7b87ee7266064e61c808a3e02fadaf1e8ad597dafeb