Analysis
-
max time kernel
59s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
fc2c410820b60ffc2066c24b563288cd7bc7a89eb1735f90411bca6ed9b0e0b6.ps1
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fc2c410820b60ffc2066c24b563288cd7bc7a89eb1735f90411bca6ed9b0e0b6.ps1
Resource
win10v2004-20220812-en
General
-
Target
fc2c410820b60ffc2066c24b563288cd7bc7a89eb1735f90411bca6ed9b0e0b6.ps1
-
Size
113KB
-
MD5
c20c376b02e7de80d21fdbde5c34aa4f
-
SHA1
5da9e3149effb9c798ca8cd86a1ac4aea7718c4e
-
SHA256
fc2c410820b60ffc2066c24b563288cd7bc7a89eb1735f90411bca6ed9b0e0b6
-
SHA512
9d8d2c33b5d19317d2404f3201bc8074a28feacc243caf8d5b09bb3d0f17f43d492477aed646154ca8ea55fdcabd4b2b7d49ed855d0d07e7c1248730eac9f02f
-
SSDEEP
1536:V55DM5hKn9N0plHalLf56fAG9DGCN+GEKXWKYJ0y9WGgz4FH:VmNnCQGgz4FH
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 316 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 316 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fc2c410820b60ffc2066c24b563288cd7bc7a89eb1735f90411bca6ed9b0e0b6.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316