Analysis

  • max time kernel
    140s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2023, 11:29

General

  • Target

    partial.ps1

  • Size

    2.5MB

  • MD5

    da4df96bc801d0948250e4ae400326c0

  • SHA1

    3e6e0d048fafc2787ac7f69a9ff3a71a03b5112e

  • SHA256

    b54672357b1092323b3f35d63ba3fb59bf71fdf678d69cacb8135d75359009f5

  • SHA512

    cc7a771201940e98686891e69d5fc17135775b4dadae4665e4f71290e1f2b4da5dc9553331c71ae534fefee1a2af7d24552f5a0cb3c76e70577705237a388f5b

  • SSDEEP

    49152:e2NpAkI/CV2as4MY3HRuRhCxFDvz0ytWLFDvz0ytW2p:FpAkmqrMY3xAhT

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\partial.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2708
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4a4 0x4e8
    1⤵
      PID:116

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bmjw5rom.gd0.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2708-133-0x000001C17D010000-0x000001C17D020000-memory.dmp

      Filesize

      64KB

    • memory/2708-136-0x000001C17D010000-0x000001C17D020000-memory.dmp

      Filesize

      64KB

    • memory/2708-144-0x000001C17F190000-0x000001C17F1B2000-memory.dmp

      Filesize

      136KB

    • memory/2708-145-0x000001C17D010000-0x000001C17D020000-memory.dmp

      Filesize

      64KB