Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 20:24

General

  • Target

    yhhljgxudqeyowcinyde44154280653/log.ps1

  • Size

    73KB

  • MD5

    50e4ca3324fa01c3292ce82924a7400e

  • SHA1

    7adfd487807bc2802bbb48d4d225c0f51a893e27

  • SHA256

    fb6dd22ce7cb0a866a8810d30c4706eccfc58c6ff0599a1fc62cc2138f1378b2

  • SHA512

    1c74763b9347bb953726fb419a4b88c24d4944a4de44b499f677ce2f3fe1b08e9eb9902c66d2b6785b1387263acedc834668421ff680312f1c8ae90f34020822

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\yhhljgxudqeyowcinyde44154280653\log.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/964-54-0x000007FEFC081000-0x000007FEFC083000-memory.dmp

    Filesize

    8KB

  • memory/964-55-0x0000000002830000-0x0000000002832000-memory.dmp

    Filesize

    8KB

  • memory/964-57-0x0000000002832000-0x0000000002834000-memory.dmp

    Filesize

    8KB

  • memory/964-58-0x0000000002834000-0x0000000002837000-memory.dmp

    Filesize

    12KB

  • memory/964-56-0x000007FEF33E0000-0x000007FEF3F3D000-memory.dmp

    Filesize

    11.4MB

  • memory/964-59-0x000000000283B000-0x000000000285A000-memory.dmp

    Filesize

    124KB