Analysis

  • max time kernel
    140s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 23:12

General

  • Target

    4272580468774c53124090a013898311.ps1

  • Size

    82KB

  • MD5

    4272580468774c53124090a013898311

  • SHA1

    cc8ce3100d1d6e6f20bdf6b878db5825cbcb1ead

  • SHA256

    7302e5fb845d51b17f29032d6fe8e71899dce390bb3db1a68aa0365bd4dbc144

  • SHA512

    56d348235375cba5358d27ec7ee66f05827174a498fa1eee0e3f09a6e08eefedbc4f3615ebc5478beb9447caf3b63117c744fe4dd67f3396079c3c1d79c3db37

  • SSDEEP

    1536:ifQsP2Gn+o3G9o0nlGhDeTy6axjU12IxyWkNpOPaWpLaR2vzf/yMwu5:G4Gnm9nnlGQgxgwIxXPLWRmzdB

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\4272580468774c53124090a013898311.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2872-5-0x00000166F3700000-0x00000166F3722000-memory.dmp

    Filesize

    136KB

  • memory/2872-13-0x00000166D8F30000-0x00000166D8F40000-memory.dmp

    Filesize

    64KB

  • memory/2872-12-0x00000166D8F30000-0x00000166D8F40000-memory.dmp

    Filesize

    64KB

  • memory/2872-11-0x00000166D8F30000-0x00000166D8F40000-memory.dmp

    Filesize

    64KB

  • memory/2872-10-0x00007FF80F340000-0x00007FF80FE01000-memory.dmp

    Filesize

    10.8MB

  • memory/2872-16-0x00007FF80F340000-0x00007FF80FE01000-memory.dmp

    Filesize

    10.8MB