Analysis
-
max time kernel
118s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 16:15
Behavioral task
behavioral1
Sample
a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd.ps1
Resource
win7-20220715-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd.ps1
Resource
win10v2004-20220722-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd.ps1
-
Size
2KB
-
MD5
926e5a0589c28d9f9df27076309b69f1
-
SHA1
f8a7a8376ed133b6875d4f008f49b1799b2cbe68
-
SHA256
a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd
-
SHA512
7bdc74249e1aa22fd0ed69c7709926e7137d386d61e00c958e8f12ec060980b482a69813ce3557ddbce901ac886ff0e2b30b2ddedc7f79b6c5c73eab7ee677ea
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 3 1168 powershell.exe 4 1168 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 1972 powershell.exe 1168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 1168 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.exedescription pid process target process PID 1972 wrote to memory of 1168 1972 powershell.exe powershell.exe PID 1972 wrote to memory of 1168 1972 powershell.exe powershell.exe PID 1972 wrote to memory of 1168 1972 powershell.exe powershell.exe PID 1972 wrote to memory of 1168 1972 powershell.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\windows\syswow64\windowspowershell\v1.0\powershell.exe"c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168