Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d.ps1
Resource
win10v2004-20220901-en
General
-
Target
3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d.ps1
-
Size
9KB
-
MD5
ed6a67c6050e6915140d66e4a7a9d0a6
-
SHA1
d7b60bf1442157a46d97819899fb53c40731e407
-
SHA256
3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d
-
SHA512
18c26def0009b0c8e84a2eb3b571412e0fe43ad2eb1025db6f6c5bca670777102daa41333b4e4ecbfa9df9509ccaa73b864745068319540126cc1474348aae60
-
SSDEEP
192:zvA9n/IBRKcFv+9VB1mKlP/+vpvwCXDxKV+pJeyuVu3/YagO8dNG4iyCt307i6RO:zvA91mWH+vpYCYAARH70hMT0
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4848 powershell.exe 4848 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4848 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848