Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
39b433e12418034013847b546bbb6d7ac096567d7fef3875727fbbbf76795231.ps1
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
39b433e12418034013847b546bbb6d7ac096567d7fef3875727fbbbf76795231.ps1
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
39b433e12418034013847b546bbb6d7ac096567d7fef3875727fbbbf76795231.ps1
-
Size
3KB
-
MD5
be3f300623c6056902b9234cfc748bc9
-
SHA1
27f4741cc72a117feed618038c1baad862ba3e73
-
SHA256
39b433e12418034013847b546bbb6d7ac096567d7fef3875727fbbbf76795231
-
SHA512
66e905880f27d3ac15c91934dbea91e1d23a342c918da380dd429a0b96349a2a6e800bc8f15abe0bfd6b25b7a8f18723bb927b544ac70c09f4529f92213066f4
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1920 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\39b433e12418034013847b546bbb6d7ac096567d7fef3875727fbbbf76795231.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920