Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 21:30

General

  • Target

    fix/speculating.ps1

  • Size

    371B

  • MD5

    bb7793ce425db431b720fb50f391cb97

  • SHA1

    fb517ddb22d112606ce8e37f7f104446b37559d8

  • SHA256

    c6ddc6d154447b822a719e91342e9d0f3e6254fccd733b847fd77c43d73927cd

  • SHA512

    caa200cd88a2a3b64079aa189c4d0d3275181bff20b907ab9802f0ca130937fb083a6701d4b939008b5bf74f5be4e81d975bff3822dee36f16d86d38977397c6

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fix\speculating.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\users\public\flapjacksXxi.jpg DrawThemeIcon
      2⤵
        PID:4248

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1056-132-0x0000017B7FE80000-0x0000017B7FEA2000-memory.dmp
      Filesize

      136KB

    • memory/1056-133-0x00007FFA06970000-0x00007FFA07431000-memory.dmp
      Filesize

      10.8MB

    • memory/1056-135-0x00007FFA06970000-0x00007FFA07431000-memory.dmp
      Filesize

      10.8MB

    • memory/4248-134-0x0000000000000000-mapping.dmp