Analysis

  • max time kernel
    380s
  • max time network
    886s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-es
  • resource tags

    arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    04-01-2023 13:57

General

  • Target

    SpotX-Win-main/scripts/installer-lang/tr.ps1

  • Size

    4KB

  • MD5

    75a8b3cf11443f935eb4a1b6c98b8909

  • SHA1

    ff8415cffc63475efc1fd8ba21b4fdda800e10bc

  • SHA256

    0e10f2a2bae3a0fa9063a7cd83ec6ceaf1a1a5b7b1a59f31dac1f4a01636ab7d

  • SHA512

    8640abe46b63c0f677c76aa90c15d1fac64c1a8e7a25b4751e59ebf3552c2523db2ec033b978ca44ff9f5ccbbc8701b9d658a32e7311fe8e6b0cdc71d8326274

  • SSDEEP

    96:aWcdPOZwbdnVo9YD44DhWmfY8nZF24VodfCJnota2PK:Z8Vbw8nZF2IodYnIXy

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\SpotX-Win-main\scripts\installer-lang\tr.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2972-122-0x000002CE50F40000-0x000002CE50FC2000-memory.dmp

    Filesize

    520KB

  • memory/2972-123-0x000002CE388C0000-0x000002CE388E2000-memory.dmp

    Filesize

    136KB

  • memory/2972-124-0x000002CE37070000-0x000002CE37080000-memory.dmp

    Filesize

    64KB

  • memory/2972-125-0x000002CE510E0000-0x000002CE511E2000-memory.dmp

    Filesize

    1.0MB

  • memory/2972-128-0x000002CE511F0000-0x000002CE51266000-memory.dmp

    Filesize

    472KB