Analysis

  • max time kernel
    366s
  • max time network
    866s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-es
  • resource tags

    arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04/01/2023, 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/pl.ps1

  • Size

    4KB

  • MD5

    6914d2c8348783ddaa65f3439bb15f5e

  • SHA1

    4171ac17565a57a932ff24aec26ec39ebeaa6a1f

  • SHA256

    8eedfdade29e38b63e90dc91edfc0cdd8da648d23005a2983ad28f177626177f

  • SHA512

    1089f8bcccf962aea64a559da6272b381a965a5ba6a2872bebed3dee7afda0c575b2f73e4be434aa072c666d030a46109e6be9565df68cfb08cda470768a1128

  • SSDEEP

    96:h+Z49E3P1uCjHvqHv9szS+cVUqDFId0aSJIKR:W5HjHiHa3qiYFR

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\pl.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3848-121-0x000001F4C08F0000-0x000001F4C0972000-memory.dmp

    Filesize

    520KB

  • memory/3848-122-0x000001F4A8460000-0x000001F4A8470000-memory.dmp

    Filesize

    64KB

  • memory/3848-123-0x000001F4C0890000-0x000001F4C08B2000-memory.dmp

    Filesize

    136KB

  • memory/3848-124-0x000001F4C2B70000-0x000001F4C2C72000-memory.dmp

    Filesize

    1.0MB

  • memory/3848-129-0x000001F4C2D00000-0x000001F4C2D76000-memory.dmp

    Filesize

    472KB