Analysis

  • max time kernel
    171s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 15:58

General

  • Target

    6c75d7a9942815d365ea815c238fb10d5ec2b95f2841d055d7b169b1e4014199.ps1

  • Size

    274KB

  • MD5

    31eba6db6e955ef9be06887a52df8f00

  • SHA1

    4f5784137e0184096a7843f9727a86feb6bb6b13

  • SHA256

    6c75d7a9942815d365ea815c238fb10d5ec2b95f2841d055d7b169b1e4014199

  • SHA512

    7cfefcd332a296a83ea23e64280cb3979a86850a3a4ccbae6740006f7b2ae44714a4bff1d96ef25036bf846f984d811115b86f77eef193f4ef45db0556e44066

  • SSDEEP

    1536:1q9D9D9D9Dc0fVtsbI3yeWotTgV4PIDzVL+6hswXgDiu+ouUE+XbnMz8PmSbexNZ:5dv

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\6c75d7a9942815d365ea815c238fb10d5ec2b95f2841d055d7b169b1e4014199.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/916-132-0x000002471F930000-0x000002471F952000-memory.dmp

    Filesize

    136KB

  • memory/916-133-0x00007FFF680E0000-0x00007FFF68BA1000-memory.dmp

    Filesize

    10.8MB

  • memory/916-134-0x00007FFF680E0000-0x00007FFF68BA1000-memory.dmp

    Filesize

    10.8MB