Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:08
Static task
static1
Behavioral task
behavioral1
Sample
23f2e867ddbbe2e6c9e7959bae0df84e.ps1
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
23f2e867ddbbe2e6c9e7959bae0df84e.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
23f2e867ddbbe2e6c9e7959bae0df84e.ps1
-
Size
485KB
-
MD5
23f2e867ddbbe2e6c9e7959bae0df84e
-
SHA1
7a9568574654f6207804900ca0bb75c5413c363b
-
SHA256
b29df81720ce329eaa0f4304025431f95e2160b2d2c88c86ac37a33d030d54f4
-
SHA512
3eae942ac2b0e40179422058bd47813a1f9b8406dc961978b31c501d25aac743a6e7a4bb5068bb32293497c0ea37ec46aafeb856af1aa59505ad029b840b83bf
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64oigu:q31u
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe 1368 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1368 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2816 1368 powershell.exe 29 PID 1368 wrote to memory of 2816 1368 powershell.exe 29 PID 1368 wrote to memory of 2816 1368 powershell.exe 29 PID 1368 wrote to memory of 2816 1368 powershell.exe 29 PID 1368 wrote to memory of 2844 1368 powershell.exe 33 PID 1368 wrote to memory of 2844 1368 powershell.exe 33 PID 1368 wrote to memory of 2844 1368 powershell.exe 33 PID 1368 wrote to memory of 2844 1368 powershell.exe 33 PID 1368 wrote to memory of 2852 1368 powershell.exe 30 PID 1368 wrote to memory of 2852 1368 powershell.exe 30 PID 1368 wrote to memory of 2852 1368 powershell.exe 30 PID 1368 wrote to memory of 2852 1368 powershell.exe 30 PID 1368 wrote to memory of 2992 1368 powershell.exe 32 PID 1368 wrote to memory of 2992 1368 powershell.exe 32 PID 1368 wrote to memory of 2992 1368 powershell.exe 32 PID 1368 wrote to memory of 2992 1368 powershell.exe 32 PID 1368 wrote to memory of 2732 1368 powershell.exe 31 PID 1368 wrote to memory of 2732 1368 powershell.exe 31 PID 1368 wrote to memory of 2732 1368 powershell.exe 31 PID 1368 wrote to memory of 2732 1368 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\23f2e867ddbbe2e6c9e7959bae0df84e.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2852
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2844
-