Analysis

  • max time kernel
    42s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2022 23:55

General

  • Target

    7.32̨ֻģ/admin/level.ps1

  • Size

    20KB

  • MD5

    0b3c4f538499c9ccf991214a6d455b82

  • SHA1

    8a17efe74fcd399a5c4cae47c712665f5f4e2501

  • SHA256

    3d99b7255dd80d5b958725ba7e9eb4d670819079b366eb6729269be073a05708

  • SHA512

    0ca56546a0fe4d8908c335de1160a49b22546d02d715fa0896949c36e3a215c8e4365529a94e15c3949c0591ae4d5b52b27d700f69f59573c4222ec53c3a9a1c

  • SSDEEP

    384:VVwnzIISnIlBnIlEFcQlBm8VCQiB90ee7dm5CRAqnLj2K+oFJdOdgos+rnuQD:VinEFudy0ee7BR7qoFaJr5D

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\7.32̨ֻģ\admin\level.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1484

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1484-54-0x000007FEFC5A1000-0x000007FEFC5A3000-memory.dmp

    Filesize

    8KB

  • memory/1484-55-0x000007FEF49D0000-0x000007FEF53F3000-memory.dmp

    Filesize

    10.1MB

  • memory/1484-57-0x00000000024A4000-0x00000000024A7000-memory.dmp

    Filesize

    12KB

  • memory/1484-56-0x000007FEF3190000-0x000007FEF3CED000-memory.dmp

    Filesize

    11.4MB

  • memory/1484-58-0x00000000024A4000-0x00000000024A7000-memory.dmp

    Filesize

    12KB

  • memory/1484-59-0x00000000024AB000-0x00000000024CA000-memory.dmp

    Filesize

    124KB