Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 18:37

General

  • Target

    QQ农场牧场源码包V4.0/upload/qqfarm/source/mc/mod/cgi_harvest_product.ps1

  • Size

    3KB

  • MD5

    9ff060db37695f962c0640af46a81d53

  • SHA1

    f0e96f3fa4929422a3ff784ff1a36298ed15b35f

  • SHA256

    c269ad84d4a018aff66de11173923b0d8e8fae9570d173d12dd351115a1767e4

  • SHA512

    815fc1400d79368690b41f0b9f1088135e0b454be802271d64f86a057ed5d076c5368760c2530dec4395726a0ffc4a998f9d8c566cc6203b0d06b987c634ecdf

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\QQ农场牧场源码包V4.0\upload\qqfarm\source\mc\mod\cgi_harvest_product.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-5-0x0000000002510000-0x0000000002518000-memory.dmp

    Filesize

    32KB

  • memory/2072-4-0x000000001B420000-0x000000001B702000-memory.dmp

    Filesize

    2.9MB

  • memory/2072-6-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-7-0x0000000002AD0000-0x0000000002B50000-memory.dmp

    Filesize

    512KB

  • memory/2072-8-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-9-0x0000000002AD0000-0x0000000002B50000-memory.dmp

    Filesize

    512KB

  • memory/2072-10-0x0000000002AD0000-0x0000000002B50000-memory.dmp

    Filesize

    512KB

  • memory/2072-11-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

    Filesize

    9.6MB