Analysis

  • max time kernel
    5s
  • max time network
    2s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 23:55

General

  • Target

    7.32̨ֻģ/admin/level.ps1

  • Size

    20KB

  • MD5

    0b3c4f538499c9ccf991214a6d455b82

  • SHA1

    8a17efe74fcd399a5c4cae47c712665f5f4e2501

  • SHA256

    3d99b7255dd80d5b958725ba7e9eb4d670819079b366eb6729269be073a05708

  • SHA512

    0ca56546a0fe4d8908c335de1160a49b22546d02d715fa0896949c36e3a215c8e4365529a94e15c3949c0591ae4d5b52b27d700f69f59573c4222ec53c3a9a1c

  • SSDEEP

    384:VVwnzIISnIlBnIlEFcQlBm8VCQiB90ee7dm5CRAqnLj2K+oFJdOdgos+rnuQD:VinEFudy0ee7BR7qoFaJr5D

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\7.32̨ֻģ\admin\level.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4424-132-0x00000240ADA30000-0x00000240ADA52000-memory.dmp

    Filesize

    136KB

  • memory/4424-133-0x00007FFD6C7C0000-0x00007FFD6D281000-memory.dmp

    Filesize

    10.8MB

  • memory/4424-134-0x00007FFD6C7C0000-0x00007FFD6D281000-memory.dmp

    Filesize

    10.8MB