Analysis
-
max time kernel
70s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-06-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
8d9190d9e5229b82ab2cc33eccf7fe6c74a269a2daf5c567991772266dfca943.ps1
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8d9190d9e5229b82ab2cc33eccf7fe6c74a269a2daf5c567991772266dfca943.ps1
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
8d9190d9e5229b82ab2cc33eccf7fe6c74a269a2daf5c567991772266dfca943.ps1
-
Size
1KB
-
MD5
673245272e3ba5c5ffab2ffa7d3c2c62
-
SHA1
666e9cb885dc8e0ddf1e1cd43dd34b9cd6df4591
-
SHA256
8d9190d9e5229b82ab2cc33eccf7fe6c74a269a2daf5c567991772266dfca943
-
SHA512
6c5876b5bb21e151e0ffb3d961b39b194a3424e8be120bb8d84c3aa0ac10c07e77b23d6b63b269c5b196ee135d5d1226819b818bcb6db086f84cb3fbfcc0ca3c
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1544 powershell.exe 1544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1544 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8d9190d9e5229b82ab2cc33eccf7fe6c74a269a2daf5c567991772266dfca943.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken