Analysis
-
max time kernel
118s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
f718a6a1dd3577d5cd358aecc57f6efb.ps1
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
f718a6a1dd3577d5cd358aecc57f6efb.ps1
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
f718a6a1dd3577d5cd358aecc57f6efb.ps1
-
Size
1KB
-
MD5
f718a6a1dd3577d5cd358aecc57f6efb
-
SHA1
2886252e80e2a1f2854599749292b5681fa248c7
-
SHA256
37fddb14cc597aa92c4fc46da3e30ce1305359c5313dbca053b22e7503579022
-
SHA512
efe95419f4ca285198b34372ed7617061cc099bc7771939f5d986e28db2c7014cbf4d3c4afde72ac500cdb87c91df685811faa1fe8e17edd668a32347247878f
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2628 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1192 2628 powershell.exe 30 PID 2628 wrote to memory of 1192 2628 powershell.exe 30 PID 2628 wrote to memory of 1192 2628 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\f718a6a1dd3577d5cd358aecc57f6efb.ps11⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c c:\Users\arrow\AppData\Local\Temp\444.exe2⤵PID:1192
-