Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 20:02
Static task
static1
Behavioral task
behavioral1
Sample
fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df.ps1
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df.ps1
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df.ps1
-
Size
2.5MB
-
MD5
869fe194f8f03c8286c2eda3ff0f80a1
-
SHA1
e79eeafe149ddccd7d907035442f8c4072237b68
-
SHA256
fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df
-
SHA512
41de9b349240fd4c4997c7d9df6b349f43d38c2c74e31384c01861be5b69d643d8825ea1a21f6540036fa714e3d904a6a0089abdce2b42f4764d6388143ec453
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1216 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216