Analysis

  • max time kernel
    370s
  • max time network
    886s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-es
  • resource tags

    arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04-01-2023 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/de.ps1

  • Size

    4KB

  • MD5

    211b02768d0cc969bbcb763898aba7b4

  • SHA1

    b6e205528eb8f8074da08442ab44514cd49b267c

  • SHA256

    db86b3fce3cef6cbfd9bd0be1e5a4413cfccbb4753dc81b430d1725d42e72e8f

  • SHA512

    c068a049bbd7b674e6fa18ff2687a818b429c4c55c3595320cd10acdb8ac3f8d73bc9ec06f03fb87dfc999d85d8897ca68b4a0da7354b6efeac0737f0cee7b36

  • SSDEEP

    48:h+WelY9/PpdRoCNSTFSuZQi3SuGHr1rQGYwct7NZf/V9vqARhiHmKvcGGC5S6Oi4:hc0KyMZ9YZeZLvlTm0Gz5zcAEHxVqu1r

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\de.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4708-119-0x0000014D35C60000-0x0000014D35CE2000-memory.dmp

    Filesize

    520KB

  • memory/4708-120-0x0000014D35C10000-0x0000014D35C32000-memory.dmp

    Filesize

    136KB

  • memory/4708-121-0x0000014D35BF0000-0x0000014D35C00000-memory.dmp

    Filesize

    64KB

  • memory/4708-122-0x0000014D35F00000-0x0000014D36002000-memory.dmp

    Filesize

    1.0MB

  • memory/4708-125-0x0000014D36090000-0x0000014D36106000-memory.dmp

    Filesize

    472KB