Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2025 09:10

General

  • Target

    Traadspinderiets.ps1

  • Size

    55KB

  • MD5

    eaf1df4bc77cdca234e0a8a155a74e3f

  • SHA1

    61f58bb82f000bd22b7de7dfbea00c112ec449a0

  • SHA256

    924cc16bec1beea5a48efaf045bfc0453c1d32f85d856fdbfbbae9e9ce2df109

  • SHA512

    9aba70b35202a526c79539ad2cdddaeb3ce0d6c6a5ee4ddf9ac5e74bf9b2c6827f723f17bd29b0944a32610171947cb0337f1ac0e6feb76d85a425ee69666246

  • SSDEEP

    1536:MGhmBtngbXTs7LvRrq9s18xo9GegSZ/DaPDI:NotgLTgrAQbUE

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Traadspinderiets.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2660" "996"
      2⤵
        PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259457924.txt

      Filesize

      1KB

      MD5

      ffd6c23d6ed87393a5377e063384f026

      SHA1

      bc50ea0bcb928ebac1d696730605377d6b2c10e4

      SHA256

      f1c7fae63bcb0cf581295866dc0b3877e7e30a6713eb717e3c8d5e113925dbed

      SHA512

      76dd67d6c7ee76f23f20459e6504df2226243adc645ca385aeba6b50a18cc5d41d759ea6323807ca4e9a47680ed0f4a4254dcfc5784118a708befd6f344c282d

    • memory/2660-10-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-7-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-6-0x0000000002870000-0x0000000002878000-memory.dmp

      Filesize

      32KB

    • memory/2660-9-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-8-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-4-0x000007FEF5A5E000-0x000007FEF5A5F000-memory.dmp

      Filesize

      4KB

    • memory/2660-11-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-12-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-13-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-17-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-16-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-5-0x000000001B500000-0x000000001B7E2000-memory.dmp

      Filesize

      2.9MB