Analysis

  • max time kernel
    38s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 11:11

General

  • Target

    malware-analysis-writeups-master/bashar-bachir-chain/files/downloader.ps1

  • Size

    996B

  • MD5

    c40333c90f34d4cbbc45c7ed4e1cd7bf

  • SHA1

    3bce9f938bb194b2c780899348459d501cc9ee2e

  • SHA256

    4e20f10918cfec989ae62dcbaa53aa2135ccfbf54a40c00c90519b7724d0e3da

  • SHA512

    b79bd0d50484fe309e8b7808f6d6f256ad5edf7bca386b02d632d2b27739c045e89aea9867dd93c5cc4f7ea0233ee57e29ef7c21a6675015a610878c714562d5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\malware-analysis-writeups-master\bashar-bachir-chain\files\downloader.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1444-54-0x000007FEFBCC1000-0x000007FEFBCC3000-memory.dmp
    Filesize

    8KB

  • memory/1444-56-0x0000000002410000-0x0000000002490000-memory.dmp
    Filesize

    512KB

  • memory/1444-55-0x000007FEF34F0000-0x000007FEF404D000-memory.dmp
    Filesize

    11.4MB

  • memory/1444-57-0x000000001B760000-0x000000001BA5F000-memory.dmp
    Filesize

    3.0MB