Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 03:30

General

  • Target

    Wambles/Firtallene.ps1

  • Size

    52KB

  • MD5

    3bc6283487e6d24c936852451b413c2a

  • SHA1

    8217f7a25aadbe7b9f081d045b6899ef3df052fd

  • SHA256

    61f5a6c21629c953a1759b9f51f6abfcf11e7e4e2d3defe593871f20d1e0715d

  • SHA512

    1b94fe5a7869e223f21b5985fdb8a61bc90b8f4a4be5704ba6008b62f30710fd0da4c34f974d00bb566dee791b6fec41572be06074a6db80c39a46e6757aba2a

  • SSDEEP

    1536:Jssv30hByqMxmagK9xwcQ8+L4M1Hkek1pJrwGMOU:JssKglt9O54M5yve

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Wambles\Firtallene.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1620" "852"
      2⤵
        PID:2516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259444383.txt

      Filesize

      1KB

      MD5

      922bdb77f49d8ae37d749e8112640ad1

      SHA1

      9b31a621a1dcad3cda342f0f2754dcd31c9f9653

      SHA256

      5fb44ff51dea132cdb0e05cf535214a9dfd98195968c04b2663fbc84bd641df9

      SHA512

      ef985db5f60f3df68d6dadc25d526b44a6b3d4dee7ede3b817067ef78dfef95b4064b87ab04a8ead4e5fea1ff5a8a0d17c42754651881d23ee19e3be0c643b12

    • memory/1620-6-0x0000000002790000-0x0000000002798000-memory.dmp

      Filesize

      32KB

    • memory/1620-5-0x000000001B440000-0x000000001B722000-memory.dmp

      Filesize

      2.9MB

    • memory/1620-4-0x000007FEF5B3E000-0x000007FEF5B3F000-memory.dmp

      Filesize

      4KB

    • memory/1620-7-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-8-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-9-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-11-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-10-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-14-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-15-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB