Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-12-2022 01:58
Static task
static1
Behavioral task
behavioral1
Sample
43de3331fb549334b316e9815f81adf79f40944587cad30a7058c98028f8cf1b.ps1
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
43de3331fb549334b316e9815f81adf79f40944587cad30a7058c98028f8cf1b.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
b860e96dc5c470d52edb8c72d160f7be604a0e367378dd0bc1baf203f2dee989.ps1
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
b860e96dc5c470d52edb8c72d160f7be604a0e367378dd0bc1baf203f2dee989.ps1
Resource
win10v2004-20221111-en
General
-
Target
b860e96dc5c470d52edb8c72d160f7be604a0e367378dd0bc1baf203f2dee989.ps1
-
Size
1KB
-
MD5
9c3b4b443258d29e24f525a927f9e62b
-
SHA1
01ee429e90ce96acedfeea9fa6297fa9848bb13a
-
SHA256
b860e96dc5c470d52edb8c72d160f7be604a0e367378dd0bc1baf203f2dee989
-
SHA512
20654ae67e91d03291f75de0f549c79fd1ae21966558957153bc7481638b74b8318ce9136787dc78720419cabe2410398f40b11f6d007e06282de85700b8033a
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\b860e96dc5c470d52edb8c72d160f7be604a0e367378dd0bc1baf203f2dee989.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944