Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2025 04:26

General

  • Target

    Kinestheses.ps1

  • Size

    52KB

  • MD5

    4281bb34dbc6a97669b1815f61d33612

  • SHA1

    605f5b8e73077d2814da07642031ce974b08f2cd

  • SHA256

    4903967d23168ae80a460eb825ad870aa4dcdc57932a522999442f4612ef3c20

  • SHA512

    9062f880f1d9af15da31f40a648677d1bc8d581c19aebff91628dcb9dc1c00b461270cf0b37f29fa26522fc75d4cf3e4476fd95d26ee7162a8c9aa44b2c52184

  • SSDEEP

    1536:wj7u/ytfDkfTspAvZPzBXY/6N/wRysUR0P2e9x:wj7uatbW0A1YCN2UG2eb

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Kinestheses.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2380" "852"
      2⤵
        PID:2304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259442568.txt

      Filesize

      1KB

      MD5

      669c6c272e4212b09b6c16b5c1ddec06

      SHA1

      a9d03a21d20019ed57d0dd00f4f63f2f36622bf3

      SHA256

      66267163ba0fa3455a7b684fb534b341397ced446fdf114f8e55e87ce5e59731

      SHA512

      a75ecffc1c04b86c6584c478c4af9944f15bd58685ec4240672c660fc8d6fcc916031b0e8445d8be0122a9e4201e0b061cef13d2e7551d4e41391c55dbb1ddf1

    • memory/2380-10-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-6-0x0000000001E10000-0x0000000001E18000-memory.dmp

      Filesize

      32KB

    • memory/2380-7-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-8-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-9-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-4-0x000007FEF62EE000-0x000007FEF62EF000-memory.dmp

      Filesize

      4KB

    • memory/2380-11-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-13-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-12-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-5-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

      Filesize

      2.9MB

    • memory/2380-16-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2380-17-0x000007FEF6030000-0x000007FEF69CD000-memory.dmp

      Filesize

      9.6MB