Analysis

  • max time kernel
    35s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-08-2021 05:57

General

  • Target

    dhl/dhl/core/autoload.php.ps1

  • Size

    845B

  • MD5

    90abcbe5f03aa3972e2530ff8cdd3c8b

  • SHA1

    1a7490ed038eeb594e0c9fe70f28762d4cd096f0

  • SHA256

    9b017150d9bf12b38a6d0c5d6ad5c1a7bf79a73726f192397dd652dda6a7f475

  • SHA512

    f238ea9618b254612fe9f29bc98b5b6abea311f3779a43a11910e937a5d7a41486ffbb8eb4d4a77e0453160593bf5cc56c238ef6815b4d463cf35c3f58c69416

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\dhl\dhl\core\autoload.php.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3260-121-0x00000126FB780000-0x00000126FB781000-memory.dmp
    Filesize

    4KB

  • memory/3260-124-0x00000126FBA40000-0x00000126FBA41000-memory.dmp
    Filesize

    4KB

  • memory/3260-128-0x00000126FB933000-0x00000126FB935000-memory.dmp
    Filesize

    8KB

  • memory/3260-127-0x00000126FB930000-0x00000126FB932000-memory.dmp
    Filesize

    8KB

  • memory/3260-137-0x00000126FB936000-0x00000126FB938000-memory.dmp
    Filesize

    8KB