Overview
overview
10Static
static
1ReklamX.bat
windows7-x64
1ReklamX.bat
windows10-2004-x64
1ReklamX.ps1
windows7-x64
1ReklamX.ps1
windows10-2004-x64
10ReklamX.vbs
windows7-x64
3ReklamX.vbs
windows10-2004-x64
3ini.bat
windows7-x64
1ini.bat
windows10-2004-x64
1ini.ps1
windows7-x64
1ini.ps1
windows10-2004-x64
1ini.vbs
windows7-x64
1ini.vbs
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-10-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
ReklamX.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ReklamX.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
ReklamX.ps1
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ReklamX.ps1
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
ReklamX.vbs
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
ReklamX.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
ini.bat
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
ini.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
ini.ps1
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
ini.ps1
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
ini.vbs
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
ini.vbs
Resource
win10v2004-20230915-en
General
-
Target
ReklamX.ps1
-
Size
257KB
-
MD5
2160e7fcf5819e58a56ff11da1573885
-
SHA1
11d0713439a76a144cba8e27cec3656e1a768fb4
-
SHA256
e51cfc4ccf015ea240546459a25884b818594916e04d987c08fa5d2b2e12aa30
-
SHA512
901b7f269701bbe56f04c39ff9b3a4581d61362dc57a5728c9b984b0b134325138e21bafbbc2a78e9978f340d597f90cf064af80cc01ed513ce2f19d9f6fcdd7
-
SSDEEP
6144:gRtFGhfHHPwtLhanP7Kwd+ApMhfMWk/vGyYv/misXHAqyOd5MZL/Zw952lSS8oyb:gRtFGhfHHPwtLhanP7Kwd+ApMhfMWk/H
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1376 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1376 powershell.exe