Analysis

  • max time kernel
    992s
  • max time network
    1000s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-es
  • resource tags

    arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04/01/2023, 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/fa.ps1

  • Size

    5KB

  • MD5

    2e7582533b6376461f2f247268ee03b9

  • SHA1

    42c29047c17464ff3d8feac177e6c3805e7e3420

  • SHA256

    5810bf61150cff4e720e486cb551d90aecb144352d00220ffcb7f10ae1ab13a5

  • SHA512

    b8a687fdac71dee9245afe15d34dbb0b4399ccc5eca65039966a1d888b1f15e2fd7ee9c8abe7030d981e4336755e124f7307f4d127b0a903222e8c9cc1d03797

  • SSDEEP

    96:tQgIVvIRIXerkOP7sdLfbrb55UA7nTKe2HVvMrE2rSB5kNq2ZecdX7U:a1qJ7oPn7QMF05kLvLU

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\fa.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2064-124-0x000001CE29FB0000-0x000001CE2A032000-memory.dmp

    Filesize

    520KB

  • memory/2064-125-0x000001CE119F0000-0x000001CE11A00000-memory.dmp

    Filesize

    64KB

  • memory/2064-126-0x000001CE29F10000-0x000001CE29F32000-memory.dmp

    Filesize

    136KB

  • memory/2064-127-0x000001CE2A250000-0x000001CE2A352000-memory.dmp

    Filesize

    1.0MB

  • memory/2064-130-0x000001CE2A3E0000-0x000001CE2A456000-memory.dmp

    Filesize

    472KB