Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 03:18

General

  • Target

    Burglarproofs/bordskaaneren.ps1

  • Size

    55KB

  • MD5

    755fb54225dd285b06c369a2f5e58082

  • SHA1

    f87f62424d1e437c7bd3b8c5fad3ed40269f140a

  • SHA256

    81e5c8c7b98950c580ef3681dca6bfb2729cc82e862dabc118a53442c4c96bc1

  • SHA512

    4efea102c5076a541f96a788d88dc550195abc0a464b0d36638a8502836077f9c02e0a636c1f9654c693a7c853df0e6b99eaf6f0d4e5ffb0f81ae64690b3c915

  • SSDEEP

    768:WaLT5CxcsKDtyp82tKMAMtIDFX7a+I+peEGQO6GmJ14YNy39RS8QEw0AEEL8Rp5E:R4w+EQ+Dk/k/GYNy39g8oWsUp5+ddV4g

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Burglarproofs\bordskaaneren.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1796" "864"
      2⤵
        PID:1844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259439519.txt

      Filesize

      1KB

      MD5

      e132a712ec09cfce4d9c52fe91e9dc40

      SHA1

      4a9a79df62b8acc57bbc0c0e8bce6fe769c4cc89

      SHA256

      4cef31826f8af6275be2387281d07a98cf20c245fa1f4b824589bb63ca25f6bd

      SHA512

      a61baddc7e86d459173fe77af05f6be7c0dffd3dc38d0bc31724c6ef7b049df97a1cc3f5622b1b575d1ea2c2736ba0cc8bc48fcf81bd5a19af35a9839bf815f1

    • memory/1796-4-0x000007FEF5ECE000-0x000007FEF5ECF000-memory.dmp

      Filesize

      4KB

    • memory/1796-8-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1796-7-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1796-6-0x0000000002820000-0x0000000002828000-memory.dmp

      Filesize

      32KB

    • memory/1796-5-0x000000001B470000-0x000000001B752000-memory.dmp

      Filesize

      2.9MB

    • memory/1796-9-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1796-11-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1796-10-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1796-12-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1796-13-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB

    • memory/1796-16-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

      Filesize

      9.6MB