Analysis
-
max time kernel
92s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
8f5233d34d2dca60d28b9baead48049ac8f5dec1fa066671d069a94c78a2f9f8.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f5233d34d2dca60d28b9baead48049ac8f5dec1fa066671d069a94c78a2f9f8.ps1
Resource
win10v2004-20220812-en
General
-
Target
8f5233d34d2dca60d28b9baead48049ac8f5dec1fa066671d069a94c78a2f9f8.ps1
-
Size
63KB
-
MD5
4e277952ef3ee77435b960cf94a73d3e
-
SHA1
4d8fd8e10edbe95ae77f7f6c497aa27d10625482
-
SHA256
8f5233d34d2dca60d28b9baead48049ac8f5dec1fa066671d069a94c78a2f9f8
-
SHA512
35c0961fce1455a276a62dc3fb670f79f9797d101cceb6f510ce51882b4bade639d4b155e0e5dc5413b3efb8e66753455343d73ff2b49f0670865353f636a96e
-
SSDEEP
768:5SHKV25WuCKW5OK5uaZ3bugaPB7Sj8EnsJN9AaC3sDpS3FX92pNZM:YHKI5WuCKW5OK5u6LuA1i9XP8B8pNu
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 704 powershell.exe 704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 704 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8f5233d34d2dca60d28b9baead48049ac8f5dec1fa066671d069a94c78a2f9f8.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704