Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
3297362893dcf07dc882d828230179304619d53c9c4d24d948638063aef0c3ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3297362893dcf07dc882d828230179304619d53c9c4d24d948638063aef0c3ba.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Arbejdslager/Medlemsideer.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Arbejdslager/Medlemsideer.ps1
Resource
win10v2004-20250217-en
General
-
Target
Arbejdslager/Medlemsideer.ps1
-
Size
51KB
-
MD5
3241d79410c0f726b435a89969fc2692
-
SHA1
2d98961d11e5eff2ff943294ca888c9c09b2d4bd
-
SHA256
a9885b7e81845b82c03d48fd27455ee43b5f7edfaa467db2578f488c3290fdd3
-
SHA512
2dbf00168125a9947749e6b03059bfe12ee20c5a7b1baa7828a09acdd40b9d85c7adc39f57eae4fb6b442c83fc2febd067685de9b082d31e6445e4d948a405c1
-
SSDEEP
768:1V2Zn8dytEVuuO4+EmQvHp6DLFNKEr25vMGjo2cJ6eCkTS0qXW6XZU2f2J1bu:14Z8dsEVOZmEDTKLJMoiAx034U2fqK
Malware Config
Signatures
-
pid Process 1936 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 powershell.exe 1936 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1936 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2572 1936 powershell.exe 31 PID 1936 wrote to memory of 2572 1936 powershell.exe 31 PID 1936 wrote to memory of 2572 1936 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Arbejdslager\Medlemsideer.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1936" "864"2⤵PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55caafb097dd713fac8fa22d6a1e643ae
SHA17b2f9f3d0794a4da4594b01a4b7604e546819d33
SHA256254dc81c180fd87e56547f97b2fc77ae2f86d3b4630fee7119f6d98daaed4aa7
SHA512e2ea93dbb201b262623eb501130d15e292d2485bf235a113d01241b90804e1be3de7b70267eea3f02c93b25f4f88829363dd0f02e92fb67cae46bb83b9cc9550