Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
startup.ps1
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
startup.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
startup.ps1
-
Size
503B
-
MD5
986525d0e1d176d3154e1ea439a8e268
-
SHA1
2c74a420a868f9f030d24338161da3a464941d7e
-
SHA256
7bfc7cb6c4714d5a8739f4dbf617ef9dd21c02484ab25a125281ecf3d14b0c9a
-
SHA512
7126a2a6ded2c8d7d0e11569c84f03c30c77a78b8b6ac60cc38784c9684e627a75021453cb8ab396e40e7014c535cee4422e5ca094ca39c35c9e8546502cf1d8
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2212 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2212 powershell.exe