Analysis

  • max time kernel
    122s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 20:43

General

  • Target

    snd_SMB3_editor_underground.ps1

  • Size

    523KB

  • MD5

    323d1fa69e79b96f91967677621ea203

  • SHA1

    be9dc12bb69ed1d3df0d432ef47dcdd76c425ea5

  • SHA256

    12bdf4559b4588f05abc9722d0bf864ff7581ed1b1893d9b6bbf461545c7a724

  • SHA512

    63610bdfafcb8b65f0c73cc8afe13a35673c35158e9fd3fe5fa50d8adfbbe8eba4d5c80a1961a002d5725523955de9af55dfd3de8b918df7d6096d7eeb4b03bb

  • SSDEEP

    12288:88P042fmcT6EJHYv/oKPftk9SEiuCchDwFCbSiT3Qgirv:880fmpEU/risPFC+E3QHv

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\snd_SMB3_editor_underground.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-5-0x000000001B320000-0x000000001B602000-memory.dmp

    Filesize

    2.9MB

  • memory/1684-4-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp

    Filesize

    9.6MB

  • memory/1684-7-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1684-6-0x0000000001D50000-0x0000000001D58000-memory.dmp

    Filesize

    32KB

  • memory/1684-8-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1684-9-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1684-10-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp

    Filesize

    9.6MB

  • memory/1684-11-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1684-12-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp

    Filesize

    9.6MB

  • memory/1684-13-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1684-14-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1684-15-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1684-16-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp

    Filesize

    9.6MB

  • memory/1684-17-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB