Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 17:11
Static task
static1
Behavioral task
behavioral1
Sample
fc2f33217e1a3595b6e287abf6f14262.ps1
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
fc2f33217e1a3595b6e287abf6f14262.ps1
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
fc2f33217e1a3595b6e287abf6f14262.ps1
-
Size
485KB
-
MD5
fc2f33217e1a3595b6e287abf6f14262
-
SHA1
607f7c499d49dce1d70f84cf7e45368065baf29f
-
SHA256
63cf348c2e3dc95324a96b8c07162556b539ff8d6dceef1d1b6f0379c42fface
-
SHA512
4ac861d100e47d5a9d11ce6fa6065ec08f4d115be7d02b0f0a230fe85661b1a845ca545b19576d4fad9756bbe26282e7518f71c1a78fe77f5a5efe3769c592d8
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64migu:q3bu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2228 powershell.exe 2228 powershell.exe 2228 powershell.exe 2228 powershell.exe 2228 powershell.exe 2228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2228 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2620 2228 powershell.exe 29 PID 2228 wrote to memory of 2620 2228 powershell.exe 29 PID 2228 wrote to memory of 2620 2228 powershell.exe 29 PID 2228 wrote to memory of 2620 2228 powershell.exe 29 PID 2228 wrote to memory of 2624 2228 powershell.exe 30 PID 2228 wrote to memory of 2624 2228 powershell.exe 30 PID 2228 wrote to memory of 2624 2228 powershell.exe 30 PID 2228 wrote to memory of 2624 2228 powershell.exe 30 PID 2228 wrote to memory of 2940 2228 powershell.exe 31 PID 2228 wrote to memory of 2940 2228 powershell.exe 31 PID 2228 wrote to memory of 2940 2228 powershell.exe 31 PID 2228 wrote to memory of 2940 2228 powershell.exe 31 PID 2228 wrote to memory of 2764 2228 powershell.exe 32 PID 2228 wrote to memory of 2764 2228 powershell.exe 32 PID 2228 wrote to memory of 2764 2228 powershell.exe 32 PID 2228 wrote to memory of 2764 2228 powershell.exe 32 PID 2228 wrote to memory of 2768 2228 powershell.exe 33 PID 2228 wrote to memory of 2768 2228 powershell.exe 33 PID 2228 wrote to memory of 2768 2228 powershell.exe 33 PID 2228 wrote to memory of 2768 2228 powershell.exe 33
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fc2f33217e1a3595b6e287abf6f14262.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2764
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2768
-