Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2023 14:08

General

  • Target

    431a2c1a50bcf37f7fbd1c938a7db19ce8cc704afffd9dd1f16da237f8006130_JC.ps1

  • Size

    2KB

  • MD5

    4f17f4aaf012836d761fe441705d06bf

  • SHA1

    7e991fc9814cca5258d2b87b12ca10208f4507ea

  • SHA256

    431a2c1a50bcf37f7fbd1c938a7db19ce8cc704afffd9dd1f16da237f8006130

  • SHA512

    fb74f3662016644590ea63a50dfe360e1ccc4b02ad8e3856b13f399ee0c064cbd94bc2e252354d48eade46045ef460e1903c323cf67172683432155a037b68f6

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\431a2c1a50bcf37f7fbd1c938a7db19ce8cc704afffd9dd1f16da237f8006130_JC.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2080

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2080-58-0x000000001B150000-0x000000001B432000-memory.dmp

    Filesize

    2.9MB

  • memory/2080-60-0x000007FEF5E10000-0x000007FEF67AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-59-0x0000000002410000-0x0000000002418000-memory.dmp

    Filesize

    32KB

  • memory/2080-61-0x000007FEF5E10000-0x000007FEF67AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-63-0x0000000002640000-0x00000000026C0000-memory.dmp

    Filesize

    512KB

  • memory/2080-62-0x0000000002640000-0x00000000026C0000-memory.dmp

    Filesize

    512KB

  • memory/2080-64-0x0000000002640000-0x00000000026C0000-memory.dmp

    Filesize

    512KB

  • memory/2080-65-0x0000000002640000-0x00000000026C0000-memory.dmp

    Filesize

    512KB

  • memory/2080-66-0x000007FEF5E10000-0x000007FEF67AD000-memory.dmp

    Filesize

    9.6MB