Analysis
-
max time kernel
31s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 11:09
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
langs/Hungarian.ps1
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
langs/Hungarian.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
langs/Korean.ps1
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
langs/Korean.ps1
Resource
win10v2004-20220812-en
General
-
Target
langs/Hungarian.ps1
-
Size
107KB
-
MD5
7591df7fae4342cbc7a0706e1b28e87b
-
SHA1
825e88ad498e8713522f5aef3b21ee01d6fa8b41
-
SHA256
fe9997629d296908247a2e82da6c369e2ea7eb4c87b12fc7c8d3ecb3e6fc320d
-
SHA512
8f58c6fbaf5ea140a3ecbbc88cbf4bdd0e0ba3fbdf169f4b7cb831094a47a6ead103f89fc07748f91d1396ebd13c7ebcc90a316f0eb203ff4c86a50be5cd3ca4
-
SSDEEP
3072:UaKBsDgGod8NAH4iyf8kXrLfKgL6YhL+L3yGU:73X
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1260 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1260-54-0x000007FEFC611000-0x000007FEFC613000-memory.dmpFilesize
8KB
-
memory/1260-55-0x000007FEF4280000-0x000007FEF4CA3000-memory.dmpFilesize
10.1MB
-
memory/1260-57-0x00000000022F4000-0x00000000022F7000-memory.dmpFilesize
12KB
-
memory/1260-56-0x000007FEF3720000-0x000007FEF427D000-memory.dmpFilesize
11.4MB
-
memory/1260-58-0x00000000022FB000-0x000000000231A000-memory.dmpFilesize
124KB
-
memory/1260-59-0x00000000022F4000-0x00000000022F7000-memory.dmpFilesize
12KB
-
memory/1260-60-0x00000000022FB000-0x000000000231A000-memory.dmpFilesize
124KB