Analysis
-
max time kernel
4s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
file.ps1
Resource
win7-20230703-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.ps1
Resource
win10v2004-20230703-en
4 signatures
150 seconds
General
-
Target
file.ps1
-
Size
12B
-
MD5
6895fd3d1043bf8f962afcca26164c24
-
SHA1
6c4d20ea5b01f38745337fff8245aa2efd706e1c
-
SHA256
b9355649973eb203250d2e680fb4371bbc44793e11ad24abffd05d4d97593cfe
-
SHA512
095619fb7a0802c83e49349cc0361cfe708fc3d68233a0b214dd7ed436af822d0426fffcf0630a7591554f1d5e359fc615e436dbd1fb09549cfae517f2936cfb
Score
1/10
Malware Config
Signatures
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3052 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3052 2388 powershell.exe 30 PID 2388 wrote to memory of 3052 2388 powershell.exe 30 PID 2388 wrote to memory of 3052 2388 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\file.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\systeminfo.exe"C:\Windows\system32\systeminfo.exe"2⤵
- Gathers system information
PID:3052
-