Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 05:39

General

  • Target

    Burglarproofs/bordskaaneren.ps1

  • Size

    55KB

  • MD5

    755fb54225dd285b06c369a2f5e58082

  • SHA1

    f87f62424d1e437c7bd3b8c5fad3ed40269f140a

  • SHA256

    81e5c8c7b98950c580ef3681dca6bfb2729cc82e862dabc118a53442c4c96bc1

  • SHA512

    4efea102c5076a541f96a788d88dc550195abc0a464b0d36638a8502836077f9c02e0a636c1f9654c693a7c853df0e6b99eaf6f0d4e5ffb0f81ae64690b3c915

  • SSDEEP

    768:WaLT5CxcsKDtyp82tKMAMtIDFX7a+I+peEGQO6GmJ14YNy39RS8QEw0AEEL8Rp5E:R4w+EQ+Dk/k/GYNy39g8oWsUp5+ddV4g

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Burglarproofs\bordskaaneren.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2712" "960"
      2⤵
        PID:844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259438790.txt

      Filesize

      1KB

      MD5

      1ead7748af8ed59cd1cb14f9e6bcbbfa

      SHA1

      3aed099c0e76675b86dec9c7583e8a0cbe3b3459

      SHA256

      8d34f2b4633083dc1112463ef834ece4890e878ebed8d6f5fadf0fd91d857ae1

      SHA512

      64985fb34e15bf32992db65be6b59831c8cbd711568cd5422a985328be04ceed09931c44a4413d1f207db6adc149eb90c0167be9d5ccf2c0aeee629bc97b80d1

    • memory/2712-7-0x0000000002970000-0x0000000002978000-memory.dmp

      Filesize

      32KB

    • memory/2712-8-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-11-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-10-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-9-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-4-0x000007FEF621E000-0x000007FEF621F000-memory.dmp

      Filesize

      4KB

    • memory/2712-6-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-12-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-13-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-14-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-5-0x000000001B570000-0x000000001B852000-memory.dmp

      Filesize

      2.9MB

    • memory/2712-17-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2712-18-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB