Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Overkeenly.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Overkeenly.ps1
Resource
win10v2004-20241007-en
General
-
Target
Overkeenly.ps1
-
Size
55KB
-
MD5
e1aaf4db5b49f5077aa39b8e8ca91243
-
SHA1
f1d68c2d223d1112f80b798a131da9e91c826bce
-
SHA256
76a1f9a4593917cdb08c30b9a444a43a7100fb1332aab4d7a4e335819eeeae55
-
SHA512
80d95f4062e06d0706c070b1071d9ba8ca3fa824532dbd3978cd95405502d48cf81dd2e5c6c329a90ebe8793e2065f22cb5502c510076ca626f6e92f0ba8608a
-
SSDEEP
1536:EBuR7slSxKxB6bwQZdh+1vnpTWOogw5C2YwBLNHh:EBuRoiKx0bvdsllCDBL/
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 576 powershell.exe 576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 576 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 576 wrote to memory of 2828 576 powershell.exe 32 PID 576 wrote to memory of 2828 576 powershell.exe 32 PID 576 wrote to memory of 2828 576 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Overkeenly.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "576" "856"2⤵PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD541d5109b664ac9b51798514d21f6762f
SHA1934897729caaa26bdfeb3b736849fb8b92ad6ff5
SHA256e71762b24104061d86b8eb2d69b0dd303ec40990da31c5ca99573cd1a145e02f
SHA51281c971d8154a6a40174b8748977e2e400ca440ecdb79cf049ba72c06ec2fbca4b5d8d3144516af129302f1fea7ddab1475ae4e434b2ba905dfcc4fba2a54480b