Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-es -
resource tags
arch:x64arch:x86image:win7-20240729-eslocale:es-esos:windows7-x64systemwindows -
submitted
17/02/2025, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
factura_2404047141_2024-09-17T02_00.exe
Resource
win7-20240903-es
Behavioral task
behavioral2
Sample
factura_2404047141_2024-09-17T02_00.exe
Resource
win10v2004-20250211-es
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-es
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250207-es
Behavioral task
behavioral5
Sample
Sightfulness.ps1
Resource
win7-20240729-es
Behavioral task
behavioral6
Sample
Sightfulness.ps1
Resource
win10v2004-20250211-es
General
-
Target
Sightfulness.ps1
-
Size
51KB
-
MD5
56df3fc2932793899317cfeb62d64449
-
SHA1
f9b092b5a1b1a127390596c69c45025c920958fc
-
SHA256
1ba02a55786e074d96e3fc4c252b9ec86d6c50b76121692680fde2b15881d4f2
-
SHA512
834b1bba8777a8b766e3214861ac9fc4850edb76ff9d225e01d79656dd373c206a2782ff4853ccb0c13e4271ac00733de2c46ed23e470007b3e480e8ed04cb3c
-
SSDEEP
1536:6VFbjdXj8k66WzJHjbDgYUpnZ3lZwb08G:SFb5okRWtHjbiZ/wgH
Malware Config
Signatures
-
pid Process 2416 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2416 powershell.exe 2416 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2416 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2728 2416 powershell.exe 31 PID 2416 wrote to memory of 2728 2416 powershell.exe 31 PID 2416 wrote to memory of 2728 2416 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Sightfulness.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2416" "892"2⤵PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d9fe3527708471efa39698b04c644e2b
SHA1aed0d7bd10458d29638c16dbb3dd76aa3c941d1e
SHA2565d8e022a4629179b615a688c7ecc543eac5d9b369421d29c6f234444dbd4b067
SHA512bac9fb33bda4f4e97d4e0919cd4a4722d876dc16475ce8d12d2bdc8b11b9ddc9e52e7695f51af4d6f96bd5e56c90a3581cd138b5c0231e2030c66bccbb7ce210