Analysis
-
max time kernel
94s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
898737831e0c460a0e50e467047df5aa60f2d759e6a490225b158db7985dfcb4.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
PDJ_effect_rukou.ps1
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
PDJ_effect_rukou.ps1
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
main.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
main.js
Resource
win10v2004-20230915-en
General
-
Target
PDJ_effect_rukou.ps1
-
Size
72KB
-
MD5
27a00722f5cccb94d591710811a45608
-
SHA1
80ffa6ddd31ec26221cc185192042e857106f5c7
-
SHA256
04b2e36350aa68570f1f70fd9250af69dde3495412b7b504297c069dedd983bd
-
SHA512
c8437d45d53d4236e00e0743737c7483980db74b42143abd3311f4869d65b89def530ec77c7f6fffdad91303eb155f231b893192a0002849a621b8b7ab73cacd
-
SSDEEP
1536:K03IXkIzbXIJ//ErnTbXQANNyJ2KU3grEkeJ0R2sp8BGzk6BNE:KeIBzg/ErfX9uJeNkf2Xck6nE
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 powershell.exe