Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/02/2025, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
JUSTIFICANTEDETRANSFERENCIA.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JUSTIFICANTEDETRANSFERENCIA.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
Spenderende.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Spenderende.ps1
Resource
win10v2004-20250211-en
General
-
Target
Spenderende.ps1
-
Size
54KB
-
MD5
cf9dc16531d6806fd98c4f0399ed4fd6
-
SHA1
f99e95bac3882f753808e211897f23ae9a6c0727
-
SHA256
9ae752b6bb7019dcb0381805c45e0cd61a6ed571442611e38334880787d11683
-
SHA512
f0552dd0f7d29ba8a3e130a072a04f7aa6ce2b4c35c493c2b8233727409101787715ed2f2f1365cef782458ab09166daa1980c93609afc5adcb995e499fc8088
-
SSDEEP
1536:FTtM4R16eKiC2MkIrUZZADIxX6PWD9qefc/ruS:FC0KwMkl3x+XuS
Malware Config
Signatures
-
pid Process 1268 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 powershell.exe 1268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1268 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2816 1268 powershell.exe 30 PID 1268 wrote to memory of 2816 1268 powershell.exe 30 PID 1268 wrote to memory of 2816 1268 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Spenderende.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1268" "908"2⤵PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52f474d10b38027180259aa138104ed6e
SHA17bd8834e19a51a171b57ac9e2b8d56bcbf8c9c8f
SHA25694bd4a346edcfcf731509db283778d7c29974d8b663235bf196963839edc34fc
SHA512bcfaa22ed1cb2b2687dfbf8ee28820cda541dfe0c81f677a8fa5c54900d69517f2735db60a9de9ef117f3a6807ee192eeec3277d6545bc4ecf49a0d5c87ad6f3