Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 08:55

General

  • Target

    Monotheistic154.ps1

  • Size

    52KB

  • MD5

    319c227e068176aaecd7365843c8bf48

  • SHA1

    079e87e0de433023e0031ba596036e69b7785fbd

  • SHA256

    ccccc37ddb764f9ecaa067032f53db5ed67b0fff95985958a966100b97c0d583

  • SHA512

    1d55477dfb7299aa68d06247f8f3a5d4e03fe7ec65c65feaef29ebc1d8d166da5f98643806e00f9724d6d4de7fd6ee538441233a6618e0345901c21d7d378f39

  • SSDEEP

    1536:dYB9gMUl+4lSKkmsNL9Q0pgq/t9TelB/AVE:KBeMUl+4EKkmsdpxtVgb

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Monotheistic154.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2052" "916"
      2⤵
        PID:2772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259460161.txt

      Filesize

      1KB

      MD5

      97be19d2e03321c7862e431424805fdc

      SHA1

      6f17c5c97fda4e6d2aa187bd403d33b2eb8fd145

      SHA256

      5f21fe2acf7f85c3344d50ff3a6686010d8f2be6278e65ff975e125e471b7679

      SHA512

      fa6cd547075e13ac3aeb03640d6cd06b45d89c137f1b895496562eac36254cddbe2e0250db3ae6c37c2389862d330898d4aaedee898278db5b7e46432cd3b91b

    • memory/2052-8-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-11-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-7-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-4-0x000007FEF63DE000-0x000007FEF63DF000-memory.dmp

      Filesize

      4KB

    • memory/2052-13-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-10-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-6-0x00000000025B0000-0x00000000025B8000-memory.dmp

      Filesize

      32KB

    • memory/2052-12-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-9-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-14-0x000007FEF63DE000-0x000007FEF63DF000-memory.dmp

      Filesize

      4KB

    • memory/2052-17-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-5-0x000000001B3D0000-0x000000001B6B2000-memory.dmp

      Filesize

      2.9MB

    • memory/2052-19-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-18-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-21-0x000007FEF6120000-0x000007FEF6ABD000-memory.dmp

      Filesize

      9.6MB

    • memory/2052-20-0x00000000028E0000-0x00000000028E5000-memory.dmp

      Filesize

      20KB