Analysis

  • max time kernel
    22s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2022 16:02

General

  • Target

    wpai-woocommerce-add-on/filters/pmxi_custom_types.ps1

  • Size

    1KB

  • MD5

    9b72798a5d9e7431f445f580c06805f6

  • SHA1

    5b295812e568c1776a8654a5cc620c6aa1cddd67

  • SHA256

    82ad6e4695589f9f18b51f650612a7145f92c72ec3d50b94142adea98a4e939a

  • SHA512

    e76e2c90b471bba864c4fde4bda1b973d070a1e3c9dd49235b3dce287f432ae417d2c40c19c9dcc76082e001a2a30f9f3b890b53737e1927adaadf0fa620ade2

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\wpai-woocommerce-add-on\filters\pmxi_custom_types.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1720-54-0x000007FEFB7D1000-0x000007FEFB7D3000-memory.dmp

    Filesize

    8KB

  • memory/1720-55-0x000007FEF3E10000-0x000007FEF4833000-memory.dmp

    Filesize

    10.1MB

  • memory/1720-57-0x0000000002A34000-0x0000000002A37000-memory.dmp

    Filesize

    12KB

  • memory/1720-56-0x000007FEF30C0000-0x000007FEF3C1D000-memory.dmp

    Filesize

    11.4MB

  • memory/1720-58-0x000000001B780000-0x000000001BA7F000-memory.dmp

    Filesize

    3.0MB

  • memory/1720-59-0x0000000002A3B000-0x0000000002A5A000-memory.dmp

    Filesize

    124KB

  • memory/1720-60-0x0000000002A34000-0x0000000002A37000-memory.dmp

    Filesize

    12KB

  • memory/1720-61-0x0000000002A3B000-0x0000000002A5A000-memory.dmp

    Filesize

    124KB