Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
rAntephialtic.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rAntephialtic.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Kinestheses.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Kinestheses.ps1
Resource
win10v2004-20250217-en
General
-
Target
Kinestheses.ps1
-
Size
52KB
-
MD5
4281bb34dbc6a97669b1815f61d33612
-
SHA1
605f5b8e73077d2814da07642031ce974b08f2cd
-
SHA256
4903967d23168ae80a460eb825ad870aa4dcdc57932a522999442f4612ef3c20
-
SHA512
9062f880f1d9af15da31f40a648677d1bc8d581c19aebff91628dcb9dc1c00b461270cf0b37f29fa26522fc75d4cf3e4476fd95d26ee7162a8c9aa44b2c52184
-
SSDEEP
1536:wj7u/ytfDkfTspAvZPzBXY/6N/wRysUR0P2e9x:wj7uatbW0A1YCN2UG2eb
Malware Config
Signatures
-
pid Process 1624 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1624 powershell.exe 1624 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1624 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2244 1624 powershell.exe 31 PID 1624 wrote to memory of 2244 1624 powershell.exe 31 PID 1624 wrote to memory of 2244 1624 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Kinestheses.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1624" "856"2⤵PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52fa9571414387495e21121c4002d26c0
SHA13a9ff6d57b397a3ce96aeb14f3c075a291af03fd
SHA256d35547105f891b2aeb30f0ac5c2b5b95740e658910058ce4306bf7567f80ddf5
SHA51262a19a608adadd5703c739948403c2267f13deab18d417c5c5078010881a4c02492273599b5556df853aff9c66f884fe3431937b420e8d9787293489e98bae8b