Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/04/2023, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
peloader.ps1
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
peloader.ps1
Resource
win10v2004-20230220-en
General
-
Target
peloader.ps1
-
Size
3KB
-
MD5
66f3811910af3760e2ad0751826161ba
-
SHA1
faac306e04b0b6ebe1fd30c3270f3e64f5f8e12c
-
SHA256
d25075fd69a9652269c4fed38ce93a58bcac803f6fff76ffe8b765eb10a94c83
-
SHA512
7118415679fe111536ac4385c3490bd24fa6b3088063a26e39c17592a578f630f9281af436678f439df6f2c415fadd1c64ec0650999f65e76b40336824bc51f5
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 920 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 920 wrote to memory of 268 920 powershell.exe 29 PID 920 wrote to memory of 268 920 powershell.exe 29 PID 920 wrote to memory of 268 920 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\peloader.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "920" "1148"2⤵PID:268
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52671012601eb4d5f891870f01555ae96
SHA150c47d9c7fab00ad30c5e8fc34f85029ba9f423b
SHA2567a8446dace4f2d7b62419ebb443d0342f716e8405f1c652cd982bb122ce20cee
SHA512a031c20c1dec3e3222979a20e450663e7eef92a7bb20e1fbbf141c2fc29632fc84d81459b98af45e63b27b27c7898c03db7072ef5a3ac5724be77ffe5ee16e39