Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 02:48
Static task
static1
Behavioral task
behavioral1
Sample
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Bredsvaerd.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Bredsvaerd.ps1
Resource
win10v2004-20241007-en
General
-
Target
Bredsvaerd.ps1
-
Size
53KB
-
MD5
c556c0c8c2ec04a75e7c7c3a2f97129f
-
SHA1
bd35a6371a4550ce15dd53928da6cc7b4ad008c1
-
SHA256
a45adf7a90cba3399fa70a4730d308b1fce47367c81a7f379f3b45d5eb2f4475
-
SHA512
b19b59a22651fd889f04ec40a625aef213dba51ea0a8ec2ba24f40f87589ed013ffdb4432d0dd3cc90287e9a73cba52114849542617c376ce5fcfc5cedfec8ec
-
SSDEEP
768:tjSc3aZguzsPXToIx+pUOugyGKxggqY/L078BxQE+++FoMoNGmxLenLYuI9jzgAd:xj3aZXwXT+OhByvcjNGmdeL+yAQI6+
Malware Config
Signatures
-
pid Process 2300 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2300 powershell.exe 2300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2300 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2560 2300 powershell.exe 32 PID 2300 wrote to memory of 2560 2300 powershell.exe 32 PID 2300 wrote to memory of 2560 2300 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Bredsvaerd.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2300" "856"2⤵PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f33a7d2d6a168e711b129b8c87fa9aa1
SHA1ebd00b7b7703ae97acf71cf328678c6b76e8ffb5
SHA256932abdeb5fd1a3a5658e74e99ce54514e908c4a22468677b85f07b862608c7b3
SHA51299657f833eea3227d5e2db5f828989402b81013f43c10d5b5ab2519f627b4c14e608cd9e2667814d0f6205917e48a32f3fbca3429cfad7f021829c231672c415