Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2025, 02:52

General

  • Target

    Fetalisation.ps1

  • Size

    53KB

  • MD5

    871a6d5157172d55968ef12e17801876

  • SHA1

    ab84cf4eb5b06098f6349c6da15d2bfb02ab2c73

  • SHA256

    37670c06c97e741fd4842a26ce3c9fdc1d715e848b1dc57376c5d7a4851c52bc

  • SHA512

    4c4a176fe4364ab03bfb35595ef2bfe3eeaaff93044662770fb51740a7be6d162a5db2b48af2d0ff8b75f0a3564871be32d27cd96a667d4dd4a0a7ab47b1eaef

  • SSDEEP

    1536:B7BJgPbaPXMHShxDO4mxTc+6munRziIgKko:B7BJUbiMHSh5NmCNmunAIgE

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Fetalisation.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "3008" "856"
      2⤵
        PID:2384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259433210.txt

      Filesize

      1KB

      MD5

      5bcd2815c74511b00c1e8ef461f5e7c5

      SHA1

      64803f63b8ebff67b8ce1b23ed58f7317bc694ca

      SHA256

      12dbe7a8e19e692996f7e832d1c42177b01a4eb206f0d5a78f2f892f2c75739e

      SHA512

      2e1dc810f7c7a83761fd5d8342ca9d755b495d907975b5e852c6e65fe45db96b7650ece6775de655e54418768b72c3256211bd872094e4030debc10f74329c80

    • memory/3008-10-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-6-0x0000000001E90000-0x0000000001E98000-memory.dmp

      Filesize

      32KB

    • memory/3008-7-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-8-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-9-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-4-0x000007FEF588E000-0x000007FEF588F000-memory.dmp

      Filesize

      4KB

    • memory/3008-11-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-12-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-13-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-14-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-5-0x000000001B6A0000-0x000000001B982000-memory.dmp

      Filesize

      2.9MB

    • memory/3008-18-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-17-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

      Filesize

      9.6MB