Analysis

  • max time kernel
    367s
  • max time network
    887s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-es
  • resource tags

    arch:x64arch:x86image:win10-20220901-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04/01/2023, 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/ru.ps1

  • Size

    5KB

  • MD5

    2c94d702c346c80f29c343882b607271

  • SHA1

    3cc1142c3a55e544ad62e1035758090f64fd11a6

  • SHA256

    70848f20ff029e84dfaea81cd76ffe6c13d477f7b17e866b929855ba6405c133

  • SHA512

    dd3660ec25c365f221041a97e00bfd0889db56890a2ff16d52f12c55fa8737807c141d980540030609575bc847023e81b5a64b97602c6f5f912ed0350b96efd8

  • SSDEEP

    96:mc8/i8+pO+0SVkXAOzdzA0y1XN60Mx6k5K8VM8Vt1uJQp1PJ1ge:r6+0SVkXNxA3dsK8VM8V0Je

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\ru.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2596-124-0x0000022853E40000-0x0000022853EC2000-memory.dmp

    Filesize

    520KB

  • memory/2596-125-0x000002283B6B0000-0x000002283B6C0000-memory.dmp

    Filesize

    64KB

  • memory/2596-126-0x000002283B890000-0x000002283B8B2000-memory.dmp

    Filesize

    136KB

  • memory/2596-127-0x0000022853FE0000-0x00000228540E2000-memory.dmp

    Filesize

    1.0MB

  • memory/2596-130-0x00000228540F0000-0x0000022854166000-memory.dmp

    Filesize

    472KB