Analysis

  • max time kernel
    37s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2023, 17:32

General

  • Target

    data/scripts/Apps/Reinstall all built-in apps.ps1

  • Size

    381B

  • MD5

    bfea03a6ba35c48fce393eeaafe141bb

  • SHA1

    5521ed51db25cda755448e0cc11b90c819b049ac

  • SHA256

    75dba22055266906644d6030adf31ecc319d1fc974b75dceae24fd4e1b352220

  • SHA512

    8906ad70eae1fd6534075ba65d72d40bd9bc54478dab0a3026819f56752f7daf38845e99d2b87e5b37483e24ee7d8c90fe24fce2fee797dc1afdd8ba78622852

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\data\scripts\Apps\Reinstall all built-in apps.ps1"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-54-0x000007FEFB771000-0x000007FEFB773000-memory.dmp

    Filesize

    8KB

  • memory/1068-55-0x000007FEF3D90000-0x000007FEF47B3000-memory.dmp

    Filesize

    10.1MB

  • memory/1068-56-0x000007FEF3230000-0x000007FEF3D8D000-memory.dmp

    Filesize

    11.4MB

  • memory/1068-58-0x000000000277B000-0x000000000279A000-memory.dmp

    Filesize

    124KB

  • memory/1068-57-0x0000000002774000-0x0000000002777000-memory.dmp

    Filesize

    12KB