Analysis

  • max time kernel
    31s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-08-2021 05:33

General

  • Target

    masam/assets/images/banner/slider-1.jpg.ps1

  • Size

    305KB

  • MD5

    d4641d37d52119ebd3055b1d61fc44da

  • SHA1

    a30508de242c0805d3114c7e5430d9a1ddec622c

  • SHA256

    55308ec5b07983fe0c5eecc4ae58066e9b5575a53c1d38587bb29b64851c6231

  • SHA512

    d2c6858462cd3a410b41e1b57ab47d1cc7dcfc4a1c108ad95b7820156ab52fe8d92fc32973311bd8981e3f5c7dec16c05862269fa6f0166807e58f37e0d86e5d

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\masam\assets\images\banner\slider-1.jpg.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3728
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3728 -s 1968
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3728-118-0x00000205A4CD0000-0x00000205A4CD1000-memory.dmp

    Filesize

    4KB

  • memory/3728-121-0x00000205A4F60000-0x00000205A4F61000-memory.dmp

    Filesize

    4KB

  • memory/3728-123-0x000002058C7C3000-0x000002058C7C5000-memory.dmp

    Filesize

    8KB

  • memory/3728-122-0x000002058C7C0000-0x000002058C7C2000-memory.dmp

    Filesize

    8KB

  • memory/3728-136-0x000002058C7C6000-0x000002058C7C8000-memory.dmp

    Filesize

    8KB