Analysis
-
max time kernel
5s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
ac0c1c0379a7f97283829cd57f8848b8ebf9cc819952c9792124eae4fc08e71a.ps1
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
General
-
Target
ac0c1c0379a7f97283829cd57f8848b8ebf9cc819952c9792124eae4fc08e71a.ps1
-
Size
327KB
-
MD5
1356a90b675211989a87a48f3b27537e
-
SHA1
c5f8c3c3ac577f8ccd8b27ee97543f48f96f6cda
-
SHA256
ac0c1c0379a7f97283829cd57f8848b8ebf9cc819952c9792124eae4fc08e71a
-
SHA512
5459e4ec6144bb160ca5a4657c2e233880ebd5ab17573e03ab184fb8b189fbf5b7f90b27e88374a9d5c6fbc96d1e23a0d33ada4abfdb2cc7905ab0682fd7398b
-
SSDEEP
3072:9j68V2ldvzD3t3ApYjK+bXMUm+I4t/qKKlUkyZWdV:9+m2TzD3t3ApYjKiXlICqKKlUlZWdV
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1184 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1184 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ac0c1c0379a7f97283829cd57f8848b8ebf9cc819952c9792124eae4fc08e71a.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184