Analysis

  • max time kernel
    365s
  • max time network
    886s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-es
  • resource tags

    arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04/01/2023, 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/ro.ps1

  • Size

    4KB

  • MD5

    3d8a0d9fbc7f14c83205d65104ec7b5f

  • SHA1

    f86e80f7bed21299dec2fc293771ce474078579c

  • SHA256

    3de0f48a2b2cca790c520c42315bb6c0b717b9883777beae06196771a7c502ca

  • SHA512

    a084e8c2fd349f604d6086adc3026f9b3cec0fd13e376cf4fc82dc68302978d398e600aba8c33392c18ff9c2ddf2ef2113266a7679d91d146f1c2c9dacdc1343

  • SSDEEP

    96:WoqGnDdO6XI6nSpM4FSz5j4gWVPiyqZn1JHCrNlLO:/Q7pvqtgVqyqpHC/S

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\ro.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4144-119-0x000001F4380E0000-0x000001F438162000-memory.dmp

    Filesize

    520KB

  • memory/4144-120-0x000001F41E370000-0x000001F41E380000-memory.dmp

    Filesize

    64KB

  • memory/4144-121-0x000001F438040000-0x000001F438062000-memory.dmp

    Filesize

    136KB

  • memory/4144-122-0x000001F438380000-0x000001F438482000-memory.dmp

    Filesize

    1.0MB

  • memory/4144-125-0x000001F438510000-0x000001F438586000-memory.dmp

    Filesize

    472KB