Analysis

  • max time kernel
    88s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 23:55

General

  • Target

    7.32̨ֻģ/admin/ipsearch.ps1

  • Size

    4KB

  • MD5

    4c7f349b3d947834235145acb70f3751

  • SHA1

    5c53f2ca9c6221c99cb70a925f03b772a8ff6f7c

  • SHA256

    8109360d4d6bcf941dae081af1c546c2039badf3994cefa2a4cc9ae6f688dc3d

  • SHA512

    2de2c02d16cac3b291130539707ef5fc81a75ab7bbf7fe4dd3233c40e10389d5901a2e59212c1a6bdaa369064890296a813b8c33672c26f276929e62f4f975f0

  • SSDEEP

    96:CnblwglVJ77bQZiAJIiJU9hNNzbIpFCX0zFMYDSjaKYHv/:CnbLlf0jChNNbIasMPPC

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\7.32̨ֻģ\admin\ipsearch.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1780

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1780-132-0x00000188C80C0000-0x00000188C80E2000-memory.dmp

    Filesize

    136KB

  • memory/1780-133-0x00007FF8606B0000-0x00007FF861171000-memory.dmp

    Filesize

    10.8MB

  • memory/1780-134-0x00007FF8606B0000-0x00007FF861171000-memory.dmp

    Filesize

    10.8MB