Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 10:51
Static task
static1
Behavioral task
behavioral1
Sample
b.ps1
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b.ps1
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
b.ps1
-
Size
310KB
-
MD5
220e9238b05cb802d63f7d79d11b2a32
-
SHA1
77324ddee92b5ee1c2d50680ea15dd6e28ef402b
-
SHA256
248d8893d926c765d168bd48211650094dbcf8a8988c448f3b271c41bec8ca9d
-
SHA512
748f9149ceaa46789938d66a87dad5c92a9beea65a7c84c07fa42378fdee70b1340d777fcfc78efcd85254660fd4a858fe10bd83464564cde7b12c01ebbcdb7a
-
SSDEEP
6144:bgkc0c/OjocmHEk4Oz7XzoUdd9qkcM1E1nvwmtPEeJDCiRO9jEYMJD:bgkc0c/OjocmH5XXEUdd97t2Vvwm1Ee3
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exeflow pid process 26 1000 powershell.exe 32 1000 powershell.exe 37 1000 powershell.exe 39 1000 powershell.exe 43 1000 powershell.exe 50 1000 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1000 powershell.exe 1000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1000 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1000-132-0x0000022A90540000-0x0000022A90562000-memory.dmpFilesize
136KB
-
memory/1000-133-0x00007FFDF4740000-0x00007FFDF5201000-memory.dmpFilesize
10.8MB
-
memory/1000-134-0x00007FFDF4740000-0x00007FFDF5201000-memory.dmpFilesize
10.8MB
-
memory/1000-135-0x0000022AA89E0000-0x0000022AA89F5000-memory.dmpFilesize
84KB
-
memory/1000-136-0x0000022AA8A4A000-0x0000022AA8A4F000-memory.dmpFilesize
20KB