Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2022 20:15

General

  • Target

    Windows10Debloater-master/Individual Scripts/Debloat Windows.ps1

  • Size

    3KB

  • MD5

    fe027363edd3aa71c6a4ae0ecb7ceaae

  • SHA1

    2061b9af054ca1f1903797b270439db656d54dff

  • SHA256

    2152bdd73176e7152a02b79170fe193e0f036b91373f8781937df67247561de0

  • SHA512

    180d0305529edfbe8b18f1627ba3a1212605c703cdd574dfb7dde020209a0fd049effa873aaa9912526501a66ae2fee5d5c9e47aee624b3962d21e6582f105af

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\Windows10Debloater-master\Individual Scripts\Debloat Windows.ps1"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1836

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1836-54-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp
    Filesize

    8KB

  • memory/1836-55-0x000007FEF3BB0000-0x000007FEF45D3000-memory.dmp
    Filesize

    10.1MB

  • memory/1836-57-0x00000000024C4000-0x00000000024C7000-memory.dmp
    Filesize

    12KB

  • memory/1836-56-0x000007FEF3050000-0x000007FEF3BAD000-memory.dmp
    Filesize

    11.4MB

  • memory/1836-58-0x00000000024CB000-0x00000000024EA000-memory.dmp
    Filesize

    124KB

  • memory/1836-60-0x00000000024CB000-0x00000000024EA000-memory.dmp
    Filesize

    124KB

  • memory/1836-59-0x00000000024C4000-0x00000000024C7000-memory.dmp
    Filesize

    12KB