Analysis
-
max time kernel
184s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
b3d9ff3258c966474e51d650992930eece3f0d8d3f0e4021df1f1afdcab1fb24.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3d9ff3258c966474e51d650992930eece3f0d8d3f0e4021df1f1afdcab1fb24.ps1
Resource
win10v2004-20221111-en
General
-
Target
b3d9ff3258c966474e51d650992930eece3f0d8d3f0e4021df1f1afdcab1fb24.ps1
-
Size
10KB
-
MD5
31ba0f5b653c93d95065ea31aff9f68e
-
SHA1
0bb2a457242f9e767cd38b8e5ede9e39faf64d08
-
SHA256
b3d9ff3258c966474e51d650992930eece3f0d8d3f0e4021df1f1afdcab1fb24
-
SHA512
e0338fe7c10ed3cca093b62b4c5db1d4964af70ba036c6ef178dd1bbb0ce5efa3c92289efe9464459f702bed46dbc1fefef58ba4fd1ff4f80e15c31156118d0e
-
SSDEEP
192:PNpJcdEteOkOxtapRhseJNF27RWuZBs6lKIu+:PNpAEte0xtaeeJNF27RWuZBs6kt+
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 powershell.exe 2220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\b3d9ff3258c966474e51d650992930eece3f0d8d3f0e4021df1f1afdcab1fb24.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220