Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
54c30a3743e54db43a1c138f93de4a7b.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54c30a3743e54db43a1c138f93de4a7b.ps1
Resource
win10v2004-20231215-en
General
-
Target
54c30a3743e54db43a1c138f93de4a7b.ps1
-
Size
12KB
-
MD5
54c30a3743e54db43a1c138f93de4a7b
-
SHA1
a8890dbee05769eaccf0061d807533391ffee140
-
SHA256
5a6cdfb6d7fe711d7b4ec5672da3d2ca4d04d879f4900ec713f0d4dada166d9f
-
SHA512
6ea3422d3dbec6f475396c04f2fdf905eba8162fd56f85de345c2255a07d58ad5ac1fbe07e6a54be6dc1cc0d56c35c210af69f029ac5825d61424416c84445ff
-
SSDEEP
96:gRYT/1w40LUUwgm2g6mtSU+93OABYxb5pB:gRYT/1w404Uwgm76mtr+93OAalrB
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1532 powershell.exe 1532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82