Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 02:11

General

  • Target

    4d127ee650218e66d9ca1e8e0a710208.ps1

  • Size

    79KB

  • MD5

    4d127ee650218e66d9ca1e8e0a710208

  • SHA1

    ff3552b1d91d792aac54ec9d19584debffbcfcd5

  • SHA256

    35a30a2c59bd9dc7ad29e9048eb3c06c3fb6ae8d85a265d060a1d28d39fe79b4

  • SHA512

    6224fe69427d46f857364515c6b852005bd18869da3e61e5f49e316d1d7c3863cf49635d7785756cbb04e37572874c3183a4b9fefee0350305dc3f3925b5ce5c

  • SSDEEP

    1536:pTgzgKoACna0KtqiKrzszs2003dXb84iuQ4hjzMkWZLLEDuc8D2NzqopkKs/WEFi:pEznoACarqiKrzn20+dXY4iuQYlWES81

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\4d127ee650218e66d9ca1e8e0a710208.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2240

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2240-4-0x000000001B230000-0x000000001B512000-memory.dmp

          Filesize

          2.9MB

        • memory/2240-5-0x0000000002420000-0x0000000002428000-memory.dmp

          Filesize

          32KB

        • memory/2240-6-0x000007FEF5B20000-0x000007FEF64BD000-memory.dmp

          Filesize

          9.6MB

        • memory/2240-7-0x0000000002460000-0x00000000024E0000-memory.dmp

          Filesize

          512KB

        • memory/2240-8-0x000007FEF5B20000-0x000007FEF64BD000-memory.dmp

          Filesize

          9.6MB

        • memory/2240-9-0x0000000002460000-0x00000000024E0000-memory.dmp

          Filesize

          512KB

        • memory/2240-10-0x0000000002460000-0x00000000024E0000-memory.dmp

          Filesize

          512KB

        • memory/2240-11-0x000007FEF5B20000-0x000007FEF64BD000-memory.dmp

          Filesize

          9.6MB