Analysis
-
max time kernel
152s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01/08/2023, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
psss.ps1
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
psss.ps1
Resource
win10v2004-20230703-en
0 signatures
150 seconds
General
-
Target
psss.ps1
-
Size
6KB
-
MD5
40d4654340f844a7226eb8363d9bdc4f
-
SHA1
c50e527a80bf984a99149738b7533aa887651e0a
-
SHA256
7b22dcff146ecaa431ff85960dcd872ad619603f76cad0817dbc6d3ec200c8ca
-
SHA512
26ab43642caa28485c094c41414f7468087dcf9ad052d3545e32ff0e2cc6abba8f6201e20ac65a9db612d3893ca61398f6df2404fee3ed27b1bafc2adc253879
-
SSDEEP
96:oLN9m7Du9qN6+5BPrxQhZVDXffmolG2lOOCApOCtI41RON/aORnwy:oLbm7DIqv/P1Q1D3mollOennaN/ady
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2848 3048 powershell.exe 29 PID 3048 wrote to memory of 2848 3048 powershell.exe 29 PID 3048 wrote to memory of 2848 3048 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\psss.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\findstr.exe"C:\Windows\system32\findstr.exe" .*.*.2⤵PID:2848
-