Analysis

  • max time kernel
    993s
  • max time network
    1001s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-es
  • resource tags

    arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04-01-2023 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/fr.ps1

  • Size

    4KB

  • MD5

    82c9b2808b168d7eb7dcf76d8091081d

  • SHA1

    643339634528956d4af42cb92a857679af07ced5

  • SHA256

    5faada67915f565288e5e5eb33b0b051ac26097ab53995a7db7a44dbd4f1d58a

  • SHA512

    eb45e05462b801c045a00bd41d9300b26230c8102777b36dfdb1117a8bcd9598f356c10eed8490fdc56444656ee5652b29e4b9d41f7b375fad3d22c12831c550

  • SSDEEP

    96:hPG/ytOco2BootyB6xaQ3RRxhPmJX/T/ru8AMvcF9JCJ:9iRYeIa757TAzCJ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\fr.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1744-124-0x000002487B490000-0x000002487B512000-memory.dmp

    Filesize

    520KB

  • memory/1744-125-0x0000024863070000-0x0000024863092000-memory.dmp

    Filesize

    136KB

  • memory/1744-126-0x0000024862EA0000-0x0000024862EB0000-memory.dmp

    Filesize

    64KB

  • memory/1744-128-0x000002487C0C0000-0x000002487C1C2000-memory.dmp

    Filesize

    1.0MB

  • memory/1744-131-0x000002487C1D0000-0x000002487C246000-memory.dmp

    Filesize

    472KB