Analysis

  • max time kernel
    364s
  • max time network
    874s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-es
  • resource tags

    arch:x64arch:x86image:win10-20220901-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04/01/2023, 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/pt.ps1

  • Size

    4KB

  • MD5

    053b619b71608ae45b1a62fceae31761

  • SHA1

    b099c5cfd833ed63fb0cf8cb0daae878a955040b

  • SHA256

    901d48da68682afeaeee4573267325b14f7b659c51ef4e9bd6a1fe04f13bd17a

  • SHA512

    01c6dd2e55d3e3cd8fe24048be87569f57dfc591fb9ecbe803be306834ab6722a759f3324eb626702acee31bff0296760c287d52cb7859b208300b69f89c9a87

  • SSDEEP

    96:/a70dotq1g5WO7idPOECTFN8ymWHtRJ7S6g5JE/lv:q0BRO78PjUT8KH+wlv

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\pt.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2804

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2804-124-0x00000214E9870000-0x00000214E98F2000-memory.dmp

    Filesize

    520KB

  • memory/2804-125-0x00000214E96C0000-0x00000214E96D0000-memory.dmp

    Filesize

    64KB

  • memory/2804-127-0x00000214E9810000-0x00000214E9832000-memory.dmp

    Filesize

    136KB

  • memory/2804-128-0x00000214EA2A0000-0x00000214EA3A2000-memory.dmp

    Filesize

    1.0MB

  • memory/2804-131-0x00000214EA430000-0x00000214EA4A6000-memory.dmp

    Filesize

    472KB