Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
6f8a2474ce15e5e5190f6b97bfbf8da3b63224d41e4e7809acb3e1fe328a0784.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6f8a2474ce15e5e5190f6b97bfbf8da3b63224d41e4e7809acb3e1fe328a0784.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Shoofa.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Shoofa.ps1
Resource
win10v2004-20241007-en
General
-
Target
Shoofa.ps1
-
Size
52KB
-
MD5
bec5624e576379638737b54edd121409
-
SHA1
8bfc71d5fc5bec930fad4dc6e55dadddffc48fdc
-
SHA256
599c9c4648fa3d92c019dc99419cd6e4129d5be92031269d042fca0f16c6ff80
-
SHA512
0ba24ae0bb04460da8459df64b1a91e4bba1fad98028766215eb28e5512a108b8240b6e94f20fabfdeececad40af929c7090e24ac529056901a689f7a1b2bd5f
-
SSDEEP
1536:pi3FuKXDbqUDEMSWwH141TJj1Z4VVUPXxLXIxnm9:OFjzbqUmWr1zZ4QZDIxnm9
Malware Config
Signatures
-
pid Process 340 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 340 powershell.exe 340 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 340 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 340 wrote to memory of 2456 340 powershell.exe 31 PID 340 wrote to memory of 2456 340 powershell.exe 31 PID 340 wrote to memory of 2456 340 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Shoofa.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "340" "856"2⤵PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cae14d0f362d02ed12bf9bbc909cdfe0
SHA173f64ddd09af45de43beb5ab93bef3f0b77c3076
SHA256f83870807e0c7333a377a9a0fdd8a597dfaee20937fad19a743e79e121a0c1ce
SHA51203b434dc67bfc5f4ac425a1013d2c72ca48d8b5b619b5f6a68a7d4b62611cca46964a2360a11a1693f7f92d0eaa98b9c82c99c76b86fba13d4e71d4820f8e609