Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 06:21

General

  • Target

    Tegnmaessig.ps1

  • Size

    55KB

  • MD5

    dbf1218b52e9c36ac61fd9588182d410

  • SHA1

    ca5b4f38b71cd9ca075b8c58d0841e56d8f49da8

  • SHA256

    8bebca4215d24a6f6ec02c135f9076a39d95ba3ae7a7487897021028ca219a68

  • SHA512

    fc50ae502ca65bed1884fd131bb89a7f5bb261079374101fe4d1d7ff1e03cffcf370c7cd7f096d65f92054164fbcc28d3e53e7f3b98c556f15fcd9f000f7e634

  • SSDEEP

    1536:2iPb6qkSSZ0oVqNj+pwQVV/P/Y99A7tGEijnOYN:BlSZ08qWwCtPqwtMx

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Tegnmaessig.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2296" "860"
      2⤵
        PID:1868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259441072.txt

      Filesize

      1KB

      MD5

      dd51c08dfdb3604a7b16ea4e20d693f1

      SHA1

      78cf92fae175c6bb23a90f4702d95c640582bb02

      SHA256

      2b7aaaddaaf7e4485bb212be6d0346d37aa832165360a65f890be79424ceb979

      SHA512

      99e528ca73647fd0d2c7456f30a1eb8f7116a51cfb16615213ca54dd76bd8a59fa792d4cd0808afd626951ddadcb2f6dbb4a766c651f7b10edd3261b596d4532

    • memory/2296-4-0x000007FEF64CE000-0x000007FEF64CF000-memory.dmp

      Filesize

      4KB

    • memory/2296-5-0x000000001B570000-0x000000001B852000-memory.dmp

      Filesize

      2.9MB

    • memory/2296-8-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

      Filesize

      9.6MB

    • memory/2296-7-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

      Filesize

      9.6MB

    • memory/2296-6-0x0000000002390000-0x0000000002398000-memory.dmp

      Filesize

      32KB

    • memory/2296-10-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

      Filesize

      9.6MB

    • memory/2296-9-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

      Filesize

      9.6MB

    • memory/2296-12-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

      Filesize

      9.6MB

    • memory/2296-11-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

      Filesize

      9.6MB

    • memory/2296-15-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

      Filesize

      9.6MB