Analysis

  • max time kernel
    21s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2022 10:25

General

  • Target

    29网课平台源码/apisub.ps1

  • Size

    42KB

  • MD5

    424e9f0a27aa43ba1cc29369d3f27cae

  • SHA1

    262e7ef1acddbcad73fe141220947c134150ee4d

  • SHA256

    092428f3e59770f08988e674556a716ccb8c0673569fca473bd2fb3c539a435e

  • SHA512

    669ea4dafa130d61b4c295c6df9d2aa70f9cd8d88725753f10ab3d2668749ba80969c9da41e35a8ce339adae6908cff10563510f38915fa0d56d178c6ea70581

  • SSDEEP

    768:bkypCLShuo8w25th2tC/nN/jNiJ+83v1y3dQAYDYJY8VvPyhdeAqDPSSLN0:lCUu1w2TotOniJ+83v1y3dQAYDYJY8Vg

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\29网课平台源码\apisub.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1256-54-0x000007FEFB5B1000-0x000007FEFB5B3000-memory.dmp

    Filesize

    8KB

  • memory/1256-55-0x000007FEF3250000-0x000007FEF3C73000-memory.dmp

    Filesize

    10.1MB

  • memory/1256-57-0x0000000002644000-0x0000000002647000-memory.dmp

    Filesize

    12KB

  • memory/1256-56-0x000007FEF2010000-0x000007FEF2B6D000-memory.dmp

    Filesize

    11.4MB

  • memory/1256-58-0x000000001B700000-0x000000001B9FF000-memory.dmp

    Filesize

    3.0MB

  • memory/1256-59-0x000000000264B000-0x000000000266A000-memory.dmp

    Filesize

    124KB

  • memory/1256-60-0x0000000002644000-0x0000000002647000-memory.dmp

    Filesize

    12KB

  • memory/1256-61-0x000000000264B000-0x000000000266A000-memory.dmp

    Filesize

    124KB