Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-01-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
5e70c004a15f9c9dd298b95046feee7f.ps1
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5e70c004a15f9c9dd298b95046feee7f.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
5e70c004a15f9c9dd298b95046feee7f.ps1
-
Size
485KB
-
MD5
5e70c004a15f9c9dd298b95046feee7f
-
SHA1
fc990eadc3d9e92d62c2fb933e40def2c96900dd
-
SHA256
a216b930fa01417a53852559e8a01e7d61aafb04d85fffedc1e81b20822f162d
-
SHA512
0eef2f58be50b8d09d9970d43953edbf98f44beaf645e0cacdf84210cf71b3a31546f9c2885a183fd8a9cce682f21c118bac53fb0435dc3a0aeff3fa2ed6c096
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64sigu:q3Zu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe 1724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2012 1724 powershell.exe 29 PID 1724 wrote to memory of 2012 1724 powershell.exe 29 PID 1724 wrote to memory of 2012 1724 powershell.exe 29 PID 1724 wrote to memory of 2012 1724 powershell.exe 29 PID 1724 wrote to memory of 1124 1724 powershell.exe 33 PID 1724 wrote to memory of 1124 1724 powershell.exe 33 PID 1724 wrote to memory of 1124 1724 powershell.exe 33 PID 1724 wrote to memory of 1124 1724 powershell.exe 33 PID 1724 wrote to memory of 1732 1724 powershell.exe 32 PID 1724 wrote to memory of 1732 1724 powershell.exe 32 PID 1724 wrote to memory of 1732 1724 powershell.exe 32 PID 1724 wrote to memory of 1732 1724 powershell.exe 32 PID 1724 wrote to memory of 1472 1724 powershell.exe 31 PID 1724 wrote to memory of 1472 1724 powershell.exe 31 PID 1724 wrote to memory of 1472 1724 powershell.exe 31 PID 1724 wrote to memory of 1472 1724 powershell.exe 31 PID 1724 wrote to memory of 2536 1724 powershell.exe 30 PID 1724 wrote to memory of 2536 1724 powershell.exe 30 PID 1724 wrote to memory of 2536 1724 powershell.exe 30 PID 1724 wrote to memory of 2536 1724 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\5e70c004a15f9c9dd298b95046feee7f.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:1472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:1732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:1124
-