Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/02/2025, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
Universitetsstuderende.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Universitetsstuderende.ps1
Resource
win10v2004-20250207-en
General
-
Target
Universitetsstuderende.ps1
-
Size
53KB
-
MD5
e4c90f84532e87a7be49136c6dedd496
-
SHA1
3318b1654e28bb021204b89ed0074125ae449a8d
-
SHA256
6313d40ac7f5dd82e268ccb8ecc0239f85d0e42fb7a484c6f6f94e644a6e36d7
-
SHA512
3ab67b0b7f0a6f2d721e18bc6a962512dd7f58be6ef77602fa8508b357871f26f71a22cca7775132758e7774aab2473dc991cde17b62fedfe2c3c928a0db169e
-
SSDEEP
1536:Lflo6h6Sdinsr7/AVs2yG0SGrIbmsynCDD:zlo6/f3Etyi3xD
Malware Config
Signatures
-
pid Process 2548 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2548 powershell.exe 2548 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3056 2548 powershell.exe 31 PID 2548 wrote to memory of 3056 2548 powershell.exe 31 PID 2548 wrote to memory of 3056 2548 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Universitetsstuderende.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2548" "908"2⤵PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51d3df2f3673cb21f754f2a10a9aef0ad
SHA1fd0663ae3f32b8cbb301b0c64258fb2cb263c48c
SHA25688acd94a6651d836474e47e3d2fcc90b6b605765fa9301e6a6fd66fc8cc1443f
SHA512ebf2dbb9c8c84f7929a1c924726439fb4ae1f419870a1742a21e869ea44b2945da907136d4c941b5392d302e6a175609b030a214eca10f91d06a230bb93db4f0