Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 11:58

General

  • Target

    8a67433f0f884eaeafe9a20e73e31e68.ps1

  • Size

    656KB

  • MD5

    8a67433f0f884eaeafe9a20e73e31e68

  • SHA1

    0038efbf78dd9f7d1ef5bb0f6bfd039e81c909a7

  • SHA256

    5cb53190466a3df6020b7a572001480487483d78e312ce42e17abd478e21eb39

  • SHA512

    5f56f743d588d2b1cd529eeeb8ff20fb7812032a59835dea866a6baaae5f00e09a09a3c00c4530c1a76d3f1bf69e019519c789015da929f806eeab57a89bf840

  • SSDEEP

    12288:EZjw0RJ9u5ILYDxD3fxYehza/tw64M8TVkc5A+:g3QTmr+

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8a67433f0f884eaeafe9a20e73e31e68.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2796-4-0x000000001B320000-0x000000001B602000-memory.dmp

    Filesize

    2.9MB

  • memory/2796-5-0x00000000025E0000-0x00000000025E8000-memory.dmp

    Filesize

    32KB

  • memory/2796-6-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2796-7-0x0000000002850000-0x00000000028D0000-memory.dmp

    Filesize

    512KB

  • memory/2796-8-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2796-9-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2796-10-0x0000000002850000-0x00000000028D0000-memory.dmp

    Filesize

    512KB