Analysis

  • max time kernel
    91s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 18:31

General

  • Target

    3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d.ps1

  • Size

    9KB

  • MD5

    ed6a67c6050e6915140d66e4a7a9d0a6

  • SHA1

    d7b60bf1442157a46d97819899fb53c40731e407

  • SHA256

    3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d

  • SHA512

    18c26def0009b0c8e84a2eb3b571412e0fe43ad2eb1025db6f6c5bca670777102daa41333b4e4ecbfa9df9509ccaa73b864745068319540126cc1474348aae60

  • SSDEEP

    192:zvA9n/IBRKcFv+9VB1mKlP/+vpvwCXDxKV+pJeyuVu3/YagO8dNG4iyCt307i6RO:zvA91mWH+vpYCYAARH70hMT0

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3baa9df5177e1ea5a32fed46a5938c58045cbc9364cd7c4c31a5eceb4513297d.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4848

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4848-132-0x000001B6DF0C0000-0x000001B6DF0E2000-memory.dmp

          Filesize

          136KB

        • memory/4848-133-0x00007FFB86930000-0x00007FFB873F1000-memory.dmp

          Filesize

          10.8MB

        • memory/4848-134-0x00007FFB86930000-0x00007FFB873F1000-memory.dmp

          Filesize

          10.8MB