Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 02:43

General

  • Target

    Tredjelandes.ps1

  • Size

    52KB

  • MD5

    85edb7354ba656bbb556d21c8e68831c

  • SHA1

    e01c029026be5e5d7e17cdd191360d9bbd9d9e27

  • SHA256

    d9b3298dafafc8f85e167c0c739d94cf6671f017e1a0cf7e759ff6158b5921ed

  • SHA512

    b86b8ee9f4f0f0421074de62c439ef5cf63b441f44b95c9a1ca28b357c9fd52c85ba00af70e975f4e5aa4601829026ee2ebec143fb9357815e76635fdf3a28d5

  • SSDEEP

    1536:qOoV6LfQgMGl7Fdwq3BcfTjOYysx3jXpsOWL9z:td5MCFaqxcfTj7vX/kz

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Tredjelandes.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1620" "856"
      2⤵
        PID:2520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259443313.txt

      Filesize

      1KB

      MD5

      87d256812e6e7998c59d24551277dc33

      SHA1

      946b49cd535d649056dab98956f69388cb9b5a26

      SHA256

      63b857dadd56311cd7f36dfe1fe56aae8a09896f8f469987a71f0191382ff28c

      SHA512

      9db838fbeca5e388c7e87bb2db8ca0a7758c2809490c3c523cb8cd9cb0cffe801ca37c9e2a0e60cff68ef7fc088fc42345f7fe7e13f82b32578afff468707354

    • memory/1620-10-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-6-0x00000000022C0000-0x00000000022C8000-memory.dmp

      Filesize

      32KB

    • memory/1620-7-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-8-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-9-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-4-0x000007FEF5B3E000-0x000007FEF5B3F000-memory.dmp

      Filesize

      4KB

    • memory/1620-11-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-12-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-13-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-5-0x000000001B570000-0x000000001B852000-memory.dmp

      Filesize

      2.9MB

    • memory/1620-16-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB

    • memory/1620-17-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

      Filesize

      9.6MB