Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 15:11

General

  • Target

    f120d685d330182fd55233e36822fdd64f79fd8029934f550e6a0d956a5aaf08.ps1

  • Size

    317KB

  • MD5

    6a806d614dba55b2d846da726500a30a

  • SHA1

    175ac20b4c5dd670990aa777d2d8c09efd7cda78

  • SHA256

    f120d685d330182fd55233e36822fdd64f79fd8029934f550e6a0d956a5aaf08

  • SHA512

    829422d5b241642534c654e7c728bb9f9127dbadd14de843fb2a65b6f54dd911b631339612b256d2bd2d8cc4befb2ca71ab05222e53a93acf6a9d3662b2ae000

  • SSDEEP

    3072:F/gd+iBRIri+L7902tl1TT+3rjHH6ZIz/3w8Qp:wRIW+Lp023orjHHQE/3w8i

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\f120d685d330182fd55233e36822fdd64f79fd8029934f550e6a0d956a5aaf08.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1880-132-0x000001D129640000-0x000001D129662000-memory.dmp

    Filesize

    136KB

  • memory/1880-133-0x00007FFD7D920000-0x00007FFD7E3E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1880-134-0x00007FFD7D920000-0x00007FFD7E3E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1880-135-0x00007FFD7D920000-0x00007FFD7E3E1000-memory.dmp

    Filesize

    10.8MB