Analysis
-
max time kernel
21s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 07:07
Static task
static1
Behavioral task
behavioral1
Sample
Full-Best_version/Full-Best_version.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Full-Best_version/Full-Best_version.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Full-Best_version/res/langs/Hungarian.ps1
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Full-Best_version/res/langs/Hungarian.ps1
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Full-Best_version/res/langs/Korean.ps1
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Full-Best_version/res/langs/Korean.ps1
Resource
win10v2004-20230220-en
General
-
Target
Full-Best_version/res/langs/Korean.ps1
-
Size
91KB
-
MD5
efae0c78be2abe2920c78b9d4785ab45
-
SHA1
8c0799fb68852cb071bbe260deb4ab357bd5f4ed
-
SHA256
ad556989f6e4a683d9668e41d2d7175b7b46847c2eef26188b9075fc600d0132
-
SHA512
44737be4d4bd0f93ca3e986c89102612932f3749b8e9b89446a567cff60ceb856b4bd7380da7fe3f1809579e6ec2162d0cdd4a217935a4961c6b36a482dd4ac8
-
SSDEEP
768:wPYhkzQl6qE7rY+xuPAsyKVmq8Ag8lyWqFk5ziCfsg8S+EZNlWJ7lxyBiCWfbMav:HSzQlc7siCmq8AFlBmLfbNA2Nt7osVP
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1544 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1544-58-0x000000001B230000-0x000000001B512000-memory.dmpFilesize
2.9MB
-
memory/1544-59-0x0000000001FC0000-0x0000000001FC8000-memory.dmpFilesize
32KB
-
memory/1544-60-0x0000000002824000-0x0000000002827000-memory.dmpFilesize
12KB
-
memory/1544-61-0x000000000282B000-0x0000000002862000-memory.dmpFilesize
220KB