Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
10-02-2022 17:22
Static task
static1
Behavioral task
behavioral1
Sample
ServR43.ps1
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ServR43.ps1
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
ServR43.ps1
-
Size
124KB
-
MD5
f44c5104f399e5c2d04db77efefbf8f5
-
SHA1
d4fb1887e9c84d5aece99a0849c64661e01a3138
-
SHA256
4c391b57d604c695925938bfc10ceb4673edd64e9655759c2aead9e12b3e17cf
-
SHA512
6c40afe943d16eb2bc55a1035806ad68406203b833a1ca34212625d0c52b5f48008da5c8bbb058c59cd561b6820f84cf02cefb3cfd17bb2ea7508a8f6e79cdc0
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1596 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1596 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1596-54-0x000007FEFC441000-0x000007FEFC443000-memory.dmpFilesize
8KB
-
memory/1596-55-0x000007FEF3630000-0x000007FEF418D000-memory.dmpFilesize
11.4MB
-
memory/1596-56-0x000007FEF5D5E000-0x000007FEF5D5F000-memory.dmpFilesize
4KB
-
memory/1596-57-0x0000000002480000-0x0000000002482000-memory.dmpFilesize
8KB
-
memory/1596-59-0x0000000002484000-0x0000000002487000-memory.dmpFilesize
12KB
-
memory/1596-58-0x0000000002482000-0x0000000002484000-memory.dmpFilesize
8KB
-
memory/1596-60-0x000000001B870000-0x000000001BB6F000-memory.dmpFilesize
3.0MB
-
memory/1596-61-0x000000000248B000-0x00000000024AA000-memory.dmpFilesize
124KB