Analysis

  • max time kernel
    45s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 20:20

General

  • Target

    PHPExcel/Classes/PHPExcel/Worksheet.ps1

  • Size

    90KB

  • MD5

    ec9773329eea5e9743073dfa44eda5b1

  • SHA1

    c34cd9c98ce70098c6be7bcb22f9f783ac827333

  • SHA256

    5c1cb6831bb2d74b8e9982a5862b94141f067b10530ef91fa94782bac994253c

  • SHA512

    261d5b5877fd051ac153dfd7fb521d87c38ab9081e403fb738b8d2a970e2b99126469d6934eb33d9df5cda1308602be21bb257f0953bb9722a02b65c3c48124d

  • SSDEEP

    1536:JZzKC6Atjk/NQkSomsGJuF/N8N07oMA7oyXBPlQ6Nd21DJ0VaaM2oYBfTjkuhDbA:JBKC6Atjk/NQkSomsGCsBTNd21DJ0m2u

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\PHPExcel\Classes\PHPExcel\Worksheet.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1912-58-0x000000001B150000-0x000000001B432000-memory.dmp

    Filesize

    2.9MB

  • memory/1912-59-0x0000000002290000-0x0000000002298000-memory.dmp

    Filesize

    32KB

  • memory/1912-60-0x0000000002360000-0x00000000023E0000-memory.dmp

    Filesize

    512KB

  • memory/1912-61-0x0000000002360000-0x00000000023E0000-memory.dmp

    Filesize

    512KB

  • memory/1912-62-0x0000000002360000-0x00000000023E0000-memory.dmp

    Filesize

    512KB

  • memory/1912-63-0x000000000236B000-0x00000000023A2000-memory.dmp

    Filesize

    220KB