Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Evighedskalenders.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Evighedskalenders.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Trttes.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Trttes.ps1
Resource
win10v2004-20241007-en
General
-
Target
Trttes.ps1
-
Size
49KB
-
MD5
7e324ee649b79b8d21cc35127546dc6f
-
SHA1
852fdc7255cff49666a79a8f1b196340679360bb
-
SHA256
ff5d64b1291d7f4d4f9274beb4a0f9bb49870cd80134a8b5392913154449b1fb
-
SHA512
df3d449df9c2e7a5258256ee5dfec849e3d5a4953674e203217e59fc2ad12fd2b44443031b1749f73e1d7051536e1db7a87bcc82a0c2cd151d17ce05422089f1
-
SSDEEP
768:llG7WqfCgl77rSbS6gD6cl9540oemcgtt0pyhFQzEaK1mHIZGX/SwjlZBqEH:LRqR77GzgD6M40oQgHHQzEx1mdX/SwV
Malware Config
Signatures
-
pid Process 2868 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 powershell.exe 2868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2896 2868 powershell.exe 29 PID 2868 wrote to memory of 2896 2868 powershell.exe 29 PID 2868 wrote to memory of 2896 2868 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Trttes.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2868" "852"2⤵PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fa96763016a3a16df482ad8129d61f3
SHA134da8f5487271f3eb5404284406e9a2dda181076
SHA25686a3727f6a6869070fb2238aa1d9ccbfbca4776026056fac4c8239c98ac6d5d7
SHA512d5e1314850477d115efbd7f43d83d55f23f26f881403b1259c331b71e7bfedc0c5cea2411c76def14124af71c889438dc9e423351ccd25f59b855b63c7c8ca62