Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2025, 15:01

General

  • Target

    Wifiekie.ps1

  • Size

    52KB

  • MD5

    07c330dfa9d289638aff19bc6de49dd1

  • SHA1

    4818a80bf7242c8e57ccbc6236d3690362d23257

  • SHA256

    6fdda7b7b31726bcfce23627378558367eb2c93a3d6999dd3d999e04be63791f

  • SHA512

    52d12bbc1c4267db0c304c31ce430399b160a3f54ace43743a42d0db1450c87f738872caac4504f6f1693c2fffc6765680afc2cd90afc4165a70023bffb976c2

  • SSDEEP

    1536:wgwwRJEj3NddbJpwC+rKH90yVxFznzaILhpuPbnmkMPp:PXEj3Nrp2WdzaIL32bmkMPp

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Wifiekie.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2488" "856"
      2⤵
        PID:2232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259450536.txt

      Filesize

      1KB

      MD5

      6c841a3d1ba8bf8423b59ce259871284

      SHA1

      b2ec368cfd5ec3bf8897e84b00f813b20bdd9589

      SHA256

      27696344fc8025d705afef313461345349b618ea915cb37ad12b1073cc8c7b96

      SHA512

      187e8b0ef9159f4928e3d33d301305e101e546d4adf514163641b30e30af7a7e2d13df1bd8bdf195adae5b461871cfa80f5f2db2d480ad58db6e1e0b7efdd950

    • memory/2488-7-0x0000000001E10000-0x0000000001E18000-memory.dmp

      Filesize

      32KB

    • memory/2488-5-0x000000001B860000-0x000000001BB42000-memory.dmp

      Filesize

      2.9MB

    • memory/2488-10-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-9-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-8-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-4-0x000007FEF5F4E000-0x000007FEF5F4F000-memory.dmp

      Filesize

      4KB

    • memory/2488-11-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-12-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-14-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-13-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-6-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-17-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-18-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

      Filesize

      9.6MB