Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-06-2021 08:14
Static task
static1
Behavioral task
behavioral1
Sample
all_deob.txt.ps1
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
all_deob.txt.ps1
-
Size
4KB
-
MD5
2a3c6390d976aec2d7bb8c440a2a3a03
-
SHA1
2162899c2d58eb3b80c917a14d408c5853aa7ef2
-
SHA256
84df27403b7b9316e2c84b8212bea94b1ffaabfe22151fb9834d1524f69b0321
-
SHA512
71c8a58ad5a5ca7af11cb5cc7366af46269d2ce908fb9cb162e26d461ab0be6f285cc0cd8d828ba2bba905cba236f66686ceabbc9b63ffed980f9cc6c134b84f
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 7 4044 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 4044 powershell.exe 4044 powershell.exe 4044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4044 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4044-118-0x000001982EC40000-0x000001982EC41000-memory.dmpFilesize
4KB
-
memory/4044-119-0x000001982ECB0000-0x000001982ECB2000-memory.dmpFilesize
8KB
-
memory/4044-121-0x000001982ECB3000-0x000001982ECB5000-memory.dmpFilesize
8KB
-
memory/4044-123-0x000001982EE40000-0x000001982EE41000-memory.dmpFilesize
4KB
-
memory/4044-156-0x000001982ECB6000-0x000001982ECB8000-memory.dmpFilesize
8KB