Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
factura pendiente.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
factura pendiente.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Feedbag/Reenjoying.ps1
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
Feedbag/Reenjoying.ps1
Resource
win10v2004-20250217-en
General
-
Target
Feedbag/Reenjoying.ps1
-
Size
55KB
-
MD5
b1900f725fdad25bd4aeb9a6f2f2c924
-
SHA1
d51648a46eb9d76709835b81f80a66502cb13a91
-
SHA256
8ba966646c30bfdacb67109ea74cbde3c3055c9595034146eb0bb4cd3c43d699
-
SHA512
381af4760ce6144e05f5a95e913bdc04a043215025f0be47fbba466cf2f501fca1be4f46b224bb95fee9a89aebe61093573d6e934ab62d62703af116262264f3
-
SSDEEP
1536:1h35jGkFoulw3aGgzsKcl91TJR/FK72ho:1NNbuulw3aGHKcH1/l6
Malware Config
Signatures
-
pid Process 2532 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2532 powershell.exe 2532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2532 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2376 2532 powershell.exe 31 PID 2532 wrote to memory of 2376 2532 powershell.exe 31 PID 2532 wrote to memory of 2376 2532 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Feedbag\Reenjoying.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2532" "852"2⤵PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5828436d7c693e5daf859b57232b10509
SHA156dfabade367cea8d791e401c3a4d6db21ca4828
SHA256171280197cc983cea8e6242d54adb093f46c75c4b586263643e7afdceae74fed
SHA512a8ba9d442dbdfd0403b2857e1acf538f0274623584056b156fb90e5e730eee28fa1ff622690fabd6fff77bddf1bd4f5e77d1ff42d3e0cc83b3885ac8409509c0