Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-01-2022 15:12
Static task
static1
Behavioral task
behavioral1
Sample
d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd.ps1
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd.ps1
-
Size
3.6MB
-
MD5
bdfc70e3237617d7a4509e9a857234eb
-
SHA1
7b1e093f630ded929fefe02c554d09a1a9d13c54
-
SHA256
d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd
-
SHA512
5bdde5d55b60e7ba1fb448bf95dd45feb2936ebaf53f5a78fa8272b522836d21a884ec5db523d09605f565d382e0015ee055de1976a3093defcc162d43abd857
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1696 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\d96de808e92e4d42e93180be95ec52fbe490c506cd839365e71cb7168df6bfbd.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1696-53-0x000007FEFC501000-0x000007FEFC503000-memory.dmpFilesize
8KB
-
memory/1696-54-0x000007FEF3890000-0x000007FEF43ED000-memory.dmpFilesize
11.4MB
-
memory/1696-56-0x0000000002402000-0x0000000002404000-memory.dmpFilesize
8KB
-
memory/1696-55-0x0000000002400000-0x0000000002402000-memory.dmpFilesize
8KB
-
memory/1696-58-0x000000000240B000-0x000000000242A000-memory.dmpFilesize
124KB
-
memory/1696-57-0x0000000002404000-0x0000000002407000-memory.dmpFilesize
12KB