Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
6ce99e07aa98ba6dc521c34cf16fbd89654d0ba59194878dffca857a4c34e57b.ps1
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6ce99e07aa98ba6dc521c34cf16fbd89654d0ba59194878dffca857a4c34e57b.ps1
Resource
win10v2004-20221111-en
General
-
Target
6ce99e07aa98ba6dc521c34cf16fbd89654d0ba59194878dffca857a4c34e57b.ps1
-
Size
147KB
-
MD5
9acba5eb2152ed9e84ac1bce3ba413e8
-
SHA1
63a735d8e3f7bae05cc6eb33bc16b04154877dc1
-
SHA256
6ce99e07aa98ba6dc521c34cf16fbd89654d0ba59194878dffca857a4c34e57b
-
SHA512
1c61ecfde31612af3bb677bd194c7d9c070fdf415b3f13aebabb4d643ad9d98920a6edf97a8c8b25c6a510c3d99c65ff0ed82466cd42238a4680059918eccb41
-
SSDEEP
3072:GMDynWNVuG7DituutQxCGsBeHjzXoCsN5o3rgsQHp9:GMDlN8G7DituutQxCGsB0jzXoCsN3sQD
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\6ce99e07aa98ba6dc521c34cf16fbd89654d0ba59194878dffca857a4c34e57b.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684