Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
RFQ ETMT 009462900_pdf(58kb).exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RFQ ETMT 009462900_pdf(58kb).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
jjuhibpwa.ps1
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
jjuhibpwa.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
wnnqrg.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
wnnqrg.exe
Resource
win10v2004-20231222-en
General
-
Target
jjuhibpwa.ps1
-
Size
503KB
-
MD5
3118a22f7f27bc50545d6a715eeaf540
-
SHA1
5e08ab4614a68d6a1c971b00026e5a522997e551
-
SHA256
6a522d00452a1638419a54a63908d0e21a6d5bb7713e86e6980082bf36121e36
-
SHA512
ec7da5c26b91509059c8610afec6b6dcceb7413241fc3395fa8449d42eebbaf9df5d096a17154b0af13cf71ee3ce4b728e777bd3858fbfcb29c898addf195ddc
-
SSDEEP
12288:Uc3Flf8fdbGHoUrATLoaxnXXG7pZBrfcUZTDvQH:Uc4fxUrATG5rfPP8
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1016 powershell.exe