Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
e49621185d8bd94f46582510e905f7895fbcbb624437a33d83df06fe12eece4f.ps1
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e49621185d8bd94f46582510e905f7895fbcbb624437a33d83df06fe12eece4f.ps1
Resource
win10v2004-20221111-en
General
-
Target
e49621185d8bd94f46582510e905f7895fbcbb624437a33d83df06fe12eece4f.ps1
-
Size
156KB
-
MD5
729bb170ed2f1fb56fead30e2cf9d2a8
-
SHA1
42677460ee131ef8bce1f56307088bd1aa82bdf8
-
SHA256
e49621185d8bd94f46582510e905f7895fbcbb624437a33d83df06fe12eece4f
-
SHA512
04c5f2c1d18369fa5f80deec0bd85f7ecf26fa9b2b4192e3d3befefc77a9c7110b71d4f1855c68848c3ae254ba737e1963dbe6a543419be282dd0bf6bdb3c2d4
-
SSDEEP
3072:wcgciJNNL5ZQiGbkYKMz0GDN1hICbeb72rJhC35z:wcgckNl5ZQiGbkYKMz0GDN1hICbebeh2
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1708 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e49621185d8bd94f46582510e905f7895fbcbb624437a33d83df06fe12eece4f.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708