Analysis
-
max time kernel
113s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-06-2023 11:29
Static task
static1
Behavioral task
behavioral1
Sample
test.ps1
Resource
win7-20230220-en
General
-
Target
test.ps1
-
Size
348B
-
MD5
ce68f0b393e0a4e77c425c8ec2750246
-
SHA1
3219c5306f6f57fcbb50f5f943438221ca965629
-
SHA256
119fce76843634821d58e19aaf65538218b5ad0dcd547932fb80f63057c471ed
-
SHA512
694f2e37c488f21b3963796cf1bc24f39cb8156caa251c0224a6e150a52eb3fa3f9e009c2767cdc6aad89e0424744f281b291240b5028f53d5d098d666379004
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1964 powershell.exe 1248 powershell.exe 1828 powershell.exe 588 powershell_ise.exe 1828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1964 powershell.exe Token: 33 1132 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1132 AUDIODG.EXE Token: 33 1132 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1132 AUDIODG.EXE Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 588 powershell_ise.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\test.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1396
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4dc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe" "C:\Users\Admin\AppData\Local\Temp\test.ps1"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347B
MD5a8149fe806f4a9af9ee03178f44676d0
SHA1026eff7f9a57c3e9b0e242a97434f8f645da189d
SHA256287fbfa11e1e6418cd5ebc14ee3e1be383f46a88b6f2f4b03d4cd86976825379
SHA5126909ce5a211309ff8e067b3bfaab5723a6a92aa1a1312d33e44280ebde8b05cfa6e8f30596e5717abd0aa2f29b2b7e3efee2ce9e7cc0ed3b60a54a4e20d63375
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5698e5a2fb3296eb5715a7d2ed40b1d21
SHA1e523c1ed5ad46e20ab80c6aecb4c8e8fd5531c9c
SHA256d9d011b7e4d55113cae7445d62138b3876b541040ca8c04e42d1d2698b311a79
SHA5124a1cc406b892ff87f65857ad8fac08f498155236f96e39037ec82be8a25cc4aa29eb997aa2196af47e71c55467b067c3160a871cb08474538058cbcd94dc443b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bdc18e7dec30a8d979b324fe552410a0
SHA14a7538ef6d99d0251c796e2264cfcaf2474023c4
SHA256228d104ce5b22e0b92d12882219d3ba46b89de059f5b0309a699a4e3ac513374
SHA5124e5defe966ea299751c9ec2f7da55b33d3ca2fa667d53d5cc6ba7baeba7ca5939d12cfb4650ccac8b0f0f71e9cb0ad96def7ff57cecc5c5f3ed2bec3e4ddb657
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8Y2YIT7Z6E04OET24DLT.temp
Filesize6KB
MD5698e5a2fb3296eb5715a7d2ed40b1d21
SHA1e523c1ed5ad46e20ab80c6aecb4c8e8fd5531c9c
SHA256d9d011b7e4d55113cae7445d62138b3876b541040ca8c04e42d1d2698b311a79
SHA5124a1cc406b892ff87f65857ad8fac08f498155236f96e39037ec82be8a25cc4aa29eb997aa2196af47e71c55467b067c3160a871cb08474538058cbcd94dc443b