Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2025, 19:00

General

  • Target

    Kinestheses.ps1

  • Size

    52KB

  • MD5

    4281bb34dbc6a97669b1815f61d33612

  • SHA1

    605f5b8e73077d2814da07642031ce974b08f2cd

  • SHA256

    4903967d23168ae80a460eb825ad870aa4dcdc57932a522999442f4612ef3c20

  • SHA512

    9062f880f1d9af15da31f40a648677d1bc8d581c19aebff91628dcb9dc1c00b461270cf0b37f29fa26522fc75d4cf3e4476fd95d26ee7162a8c9aa44b2c52184

  • SSDEEP

    1536:wj7u/ytfDkfTspAvZPzBXY/6N/wRysUR0P2e9x:wj7uatbW0A1YCN2UG2eb

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Kinestheses.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1624" "856"
      2⤵
        PID:2244

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259441993.txt

      Filesize

      1KB

      MD5

      2fa9571414387495e21121c4002d26c0

      SHA1

      3a9ff6d57b397a3ce96aeb14f3c075a291af03fd

      SHA256

      d35547105f891b2aeb30f0ac5c2b5b95740e658910058ce4306bf7567f80ddf5

      SHA512

      62a19a608adadd5703c739948403c2267f13deab18d417c5c5078010881a4c02492273599b5556df853aff9c66f884fe3431937b420e8d9787293489e98bae8b

    • memory/1624-4-0x000007FEF5DBE000-0x000007FEF5DBF000-memory.dmp

      Filesize

      4KB

    • memory/1624-5-0x000000001B8B0000-0x000000001BB92000-memory.dmp

      Filesize

      2.9MB

    • memory/1624-6-0x0000000001D90000-0x0000000001D98000-memory.dmp

      Filesize

      32KB

    • memory/1624-7-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-10-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-9-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-8-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-11-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-13-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-12-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-16-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

      Filesize

      9.6MB