Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2023 04:20

General

  • Target

    apisub.ps1

  • Size

    64KB

  • MD5

    f22a8ea5677a830f6b2de5210c18d3ec

  • SHA1

    e261fa40d0277c5d366062eb7d7cd8ce3edb2acf

  • SHA256

    4520e749d4816e79977c4b6720ad12268bc83a0a6ee3a6d1151f002e6dc80ca3

  • SHA512

    ca75c4c643f2c220e216e0f7f0b98899607aedf31fa977032a02e3b0748ea1f417dbbdf299bc87c21ca32a06718747b5220c166c448bbe410f4e72230735b9e0

  • SSDEEP

    1536:xv7R820BfAuJMUC4LDsa2FssRH5e745DWaEFCsrHXeFiMPZl:xv7REBTJMH

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\apisub.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2364-4-0x000000001B190000-0x000000001B472000-memory.dmp

    Filesize

    2.9MB

  • memory/2364-6-0x0000000002510000-0x0000000002518000-memory.dmp

    Filesize

    32KB

  • memory/2364-7-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/2364-5-0x000007FEF54B0000-0x000007FEF5E4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2364-8-0x000007FEF54B0000-0x000007FEF5E4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2364-9-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/2364-10-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/2364-11-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/2364-12-0x0000000002530000-0x00000000025B0000-memory.dmp

    Filesize

    512KB

  • memory/2364-13-0x000007FEF54B0000-0x000007FEF5E4D000-memory.dmp

    Filesize

    9.6MB