Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:35
Static task
static1
Behavioral task
behavioral1
Sample
034e0a3d97747d22038e1863c0f2d4b8.ps1
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
034e0a3d97747d22038e1863c0f2d4b8.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
034e0a3d97747d22038e1863c0f2d4b8.ps1
-
Size
485KB
-
MD5
034e0a3d97747d22038e1863c0f2d4b8
-
SHA1
aa7dc1943e46dc5b62d9fdb050e1463f109cdc84
-
SHA256
1fafe44a7b9f6885458eb4c07a5eb607e55defd89ce8540422e7b8da3f1f58c4
-
SHA512
1099751fc9c3d268ee726e72a0d3a8efebd8d068a8c85427cfdeca22bf4aeaa686d4a8c27911c455ca347dddb8b45942463124f1f73c1bc880f55e9d4d5a8657
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64+igu:q3Xu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2588 2184 powershell.exe 29 PID 2184 wrote to memory of 2588 2184 powershell.exe 29 PID 2184 wrote to memory of 2588 2184 powershell.exe 29 PID 2184 wrote to memory of 2588 2184 powershell.exe 29 PID 2184 wrote to memory of 2180 2184 powershell.exe 30 PID 2184 wrote to memory of 2180 2184 powershell.exe 30 PID 2184 wrote to memory of 2180 2184 powershell.exe 30 PID 2184 wrote to memory of 2180 2184 powershell.exe 30 PID 2184 wrote to memory of 2952 2184 powershell.exe 31 PID 2184 wrote to memory of 2952 2184 powershell.exe 31 PID 2184 wrote to memory of 2952 2184 powershell.exe 31 PID 2184 wrote to memory of 2952 2184 powershell.exe 31 PID 2184 wrote to memory of 2788 2184 powershell.exe 32 PID 2184 wrote to memory of 2788 2184 powershell.exe 32 PID 2184 wrote to memory of 2788 2184 powershell.exe 32 PID 2184 wrote to memory of 2788 2184 powershell.exe 32 PID 2184 wrote to memory of 2820 2184 powershell.exe 33 PID 2184 wrote to memory of 2820 2184 powershell.exe 33 PID 2184 wrote to memory of 2820 2184 powershell.exe 33 PID 2184 wrote to memory of 2820 2184 powershell.exe 33
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\034e0a3d97747d22038e1863c0f2d4b8.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2820
-