Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Chromonemal.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Chromonemal.ps1
Resource
win10v2004-20241007-en
General
-
Target
Chromonemal.ps1
-
Size
53KB
-
MD5
65171ebd8fd8c699770edee943ff09f1
-
SHA1
dc17dd3e384f06c03015b136cc068c2973673981
-
SHA256
73a4a59e35863571281154449961ab2a81ff47c3baa341d7de100287a0043274
-
SHA512
f0f1c8a7dfa94feb7fc7e170ad4abfde9a4bc7d7af1a5c4cd763ca93484256a6a37fd5fb515345987af8daaedd812cfb3e0f5944ccdb0ee4983a0a71da53a144
-
SSDEEP
1536:02be3lIq1gxBdV5jNQpNwrZHHoVmbclOHoEah/B66z:0OEj1EV5oYdIV2cXhwk
Malware Config
Signatures
-
pid Process 2200 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 powershell.exe 2200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2200 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2220 2200 powershell.exe 32 PID 2200 wrote to memory of 2220 2200 powershell.exe 32 PID 2200 wrote to memory of 2220 2200 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Chromonemal.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2200" "908"2⤵PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55cdf54b73c18eae51d280e555b8a146d
SHA1f2c432c0ce4f68b2501547d529cdcda4cb76d8d1
SHA256c779d9b52cae4e629f15893a1508d576b8bab2f1641093ac47d6f44dc759dff2
SHA512a5a5c47d3cbe0bc44c816c4f8415bc648db8aa5df134451f67e9d8d61419ba874bc3998b07b13d9196f1e7565a7a26f81a4ece8498fe8e424798d7bc9b3ff828