Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 05:35

General

  • Target

    Burglarproofs/bordskaaneren.ps1

  • Size

    55KB

  • MD5

    755fb54225dd285b06c369a2f5e58082

  • SHA1

    f87f62424d1e437c7bd3b8c5fad3ed40269f140a

  • SHA256

    81e5c8c7b98950c580ef3681dca6bfb2729cc82e862dabc118a53442c4c96bc1

  • SHA512

    4efea102c5076a541f96a788d88dc550195abc0a464b0d36638a8502836077f9c02e0a636c1f9654c693a7c853df0e6b99eaf6f0d4e5ffb0f81ae64690b3c915

  • SSDEEP

    768:WaLT5CxcsKDtyp82tKMAMtIDFX7a+I+peEGQO6GmJ14YNy39RS8QEw0AEEL8Rp5E:R4w+EQ+Dk/k/GYNy39g8oWsUp5+ddV4g

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Burglarproofs\bordskaaneren.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2800" "856"
      2⤵
        PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259409416.txt

      Filesize

      1KB

      MD5

      5994ba7b3636d2a336e4958dcdf75d09

      SHA1

      e10fae433ee4bc82268fd79eb28bb3462d136d6d

      SHA256

      4d1479420e7f32fde4605afe445f4aff35305ca2ada320501c7ac96ed4134f99

      SHA512

      103e2ecc65c39d3497cd1c62938a9b6b5c12566de362e457c7e96ff1902a5e23e366ab3fe388217ee0e33b22255735ccf2a796d4a64f38a2d2495bea0c0e07e0

    • memory/2800-10-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-7-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-6-0x00000000027A0000-0x00000000027A8000-memory.dmp

      Filesize

      32KB

    • memory/2800-9-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-8-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-4-0x000007FEF674E000-0x000007FEF674F000-memory.dmp

      Filesize

      4KB

    • memory/2800-11-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-12-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-13-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-14-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-5-0x000000001B850000-0x000000001BB32000-memory.dmp

      Filesize

      2.9MB

    • memory/2800-17-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-18-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

      Filesize

      9.6MB