Analysis
-
max time kernel
12s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10-06-2021 23:21
Static task
static1
Behavioral task
behavioral1
Sample
2.ps1
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2.ps1
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
2.ps1
-
Size
2KB
-
MD5
5798c853ffa7703ed05c1bef5649ff35
-
SHA1
71663e8f0b867df83f14f9b1068f07d7856c51eb
-
SHA256
c935b69cc2be264c92368f9f0649608b58932e23db815ca24a1a1adb19cb0c8f
-
SHA512
3b46f6799a83f343f2bf79762a4841508180cf94e36200ea99bf0ee422f0000b49cd09bb68189be34dd39b513890c09fd0f98a0a7eb8e407d7e8f67d499235cc
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 852 powershell.exe 852 powershell.exe 852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 852 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/852-118-0x00000223BB0B0000-0x00000223BB0B1000-memory.dmpFilesize
4KB
-
memory/852-121-0x00000223BB3D0000-0x00000223BB3D1000-memory.dmpFilesize
4KB
-
memory/852-122-0x00000223BB140000-0x00000223BB142000-memory.dmpFilesize
8KB
-
memory/852-123-0x00000223BB143000-0x00000223BB145000-memory.dmpFilesize
8KB
-
memory/852-134-0x00000223BB146000-0x00000223BB148000-memory.dmpFilesize
8KB