Resubmissions
22-10-2023 07:45
231022-jlnrgsec5z 122-10-2023 07:45
231022-jlfqwaec5x 122-10-2023 07:16
231022-h396dafg39 122-10-2023 07:16
231022-h35kwsdh91 122-10-2023 02:52
231022-dc448aeh48 122-10-2023 00:56
231022-bafyhacg5v 121-10-2023 23:14
231021-28f92ace5w 121-10-2023 23:13
231021-27wnbsed44 121-10-2023 22:55
231021-2v3wwaed24 121-10-2023 22:52
231021-2tp9dsec99 1Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 21:18
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
script.ps1
Resource
android-x86-arm-20231020-en
Behavioral task
behavioral3
Sample
script.ps1
Resource
android-x64-20230831-en
Behavioral task
behavioral4
Sample
script.ps1
Resource
android-x64-arm64-20231020-en
Behavioral task
behavioral5
Sample
script.ps1
Resource
macos-20220504-en
General
-
Target
script.ps1
-
Size
7B
-
MD5
b53e9d6ee571941799a04433ef54b973
-
SHA1
525df30db44c421d4c9d9f4a0aa55f0b3da13405
-
SHA256
bb2577fdef6d5d1596b10a9b1300dfb84243a8088dda01006dd4357f89f9cc8c
-
SHA512
b855aa9789acf4a3927421690d3f8fda22c2b93ec61ed215e792f8eadee0d8aa053b7f09b05e1b5037cb7286fb5d5b32c9bc21312ca788fa52375089a45cfa10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2768 3000 powershell.exe 29 PID 3000 wrote to memory of 2768 3000 powershell.exe 29 PID 3000 wrote to memory of 2768 3000 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\Wbem\WinMgmt.exe"C:\Windows\System32\Wbem\WinMgmt.exe"2⤵PID:2768
-