Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2025, 04:23

General

  • Target

    Respektlsestes.ps1

  • Size

    51KB

  • MD5

    f177e247c8beadd6e0762493d8e9fe79

  • SHA1

    008d26170d63c58d17695dfa8196e4ce8feb920a

  • SHA256

    825dc4cae1f45f17dc54bd1ec82d890b8266691b5fad32e7882fc8dc6bc2c71b

  • SHA512

    fa9a9a02bcb1d2725b228aea9a8141536578b9cf023b81c2df9a58e1e046f83314f85bb74dca5bd9c0a6ac6cbaad5d74269ae5efa2b15925609fe51308b81884

  • SSDEEP

    1536:3SUTaGUqdmQ8RJETuiBhBzcS6amUmRHYi:iUDQR0bBhCCSH7

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Respektlsestes.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2072" "852"
      2⤵
        PID:1792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259453034.txt

      Filesize

      1KB

      MD5

      0aa83174387604aa4415f0d9713e0ae1

      SHA1

      f7ee7eb1db303d9532471c2ecc3a6f6f3a6a2e77

      SHA256

      c794ce2c7b63f85b70c60acf1fecb51a757cb7e563771501720b66a99f54d415

      SHA512

      fa7e36d56a10e3edf8b7b7847a7f3333e877690cdc28c92f8d13a8155e5e1929e63a904d2510ad9bc611255f246b09ceaa942323810650b319489f5f9b78f848

    • memory/2072-11-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-6-0x0000000002240000-0x0000000002248000-memory.dmp

      Filesize

      32KB

    • memory/2072-7-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-8-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-9-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-4-0x000007FEF5E0E000-0x000007FEF5E0F000-memory.dmp

      Filesize

      4KB

    • memory/2072-10-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-12-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-14-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-13-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-5-0x000000001B690000-0x000000001B972000-memory.dmp

      Filesize

      2.9MB

    • memory/2072-18-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2072-17-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

      Filesize

      9.6MB