Analysis

  • max time kernel
    394s
  • max time network
    875s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 18:49

General

  • Target

    Windows.exe

  • Size

    187KB

  • MD5

    17187cb3c7e7ea255dd09640d80dd10c

  • SHA1

    49ea78ac549ac474eeadf926a46b47a1b0253375

  • SHA256

    bc9805f25ccd605e0267a8ec7210274e4a4bbfa0ea2eb9670c22390e2cc28556

  • SHA512

    ee7725b15c686e6162988140f504e16f4222d1a2382a156be6c5f5ae4a453f461915d954093778a415dd583dfc2178465fd1c64349ab629dba478e3b92677a62

  • SSDEEP

    3072:gTKhQsJS1OKynJfaE/uylBzDylgeBKWr680QGS/odFSP0692Y2ElP4kg2YkD:EKhhJS1IJyE/HBXw/KWB0QZ/oQt92Y2W

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Windows.exe
    "C:\Users\Admin\AppData\Local\Temp\Windows.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Quest Software\PowerGUI\c279626d-0be1-47ba-973f-48ec0ce928a0\zip.PS1

    Filesize

    1KB

    MD5

    390154311ec34c9f5c69678cbb6f2634

    SHA1

    c7ff4cf5d83b0adb2972a61d56cddf6b6d9adaa4

    SHA256

    8b69f0f689b635af6acc57a455829e4ebbc7a77be11a4e9c194189a26e4c53c7

    SHA512

    901ec1b5db1d4b1c10baea4d6f72ad3fb912d9da8f0dfa98fc8c01e77fb00a71e1cd371fe272b43f84d72ba3caf3ea5940ab7ac91c7d9234a5f94c1f2b13da51

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wdrkkaf1.tou.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • memory/2476-118-0x0000000000250000-0x0000000000286000-memory.dmp

    Filesize

    216KB

  • memory/2476-119-0x00000000009C0000-0x00000000009DA000-memory.dmp

    Filesize

    104KB

  • memory/2476-120-0x000000001AD80000-0x000000001ADB8000-memory.dmp

    Filesize

    224KB

  • memory/2476-126-0x000000001ADD0000-0x000000001ADE0000-memory.dmp

    Filesize

    64KB

  • memory/2476-127-0x000000001DF60000-0x000000001DF82000-memory.dmp

    Filesize

    136KB

  • memory/2476-128-0x000000001EAC0000-0x000000001EB36000-memory.dmp

    Filesize

    472KB

  • memory/2476-138-0x000000001ADD0000-0x000000001ADE0000-memory.dmp

    Filesize

    64KB

  • memory/2476-139-0x000000001ADD0000-0x000000001ADE0000-memory.dmp

    Filesize

    64KB

  • memory/2476-140-0x000000001ADD0000-0x000000001ADE0000-memory.dmp

    Filesize

    64KB