Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
9019caf9c14645b88f4c246b16bda29a.ps1
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
9019caf9c14645b88f4c246b16bda29a.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
9019caf9c14645b88f4c246b16bda29a.ps1
-
Size
485KB
-
MD5
9019caf9c14645b88f4c246b16bda29a
-
SHA1
8e85880050a174b2b7c7dcaa61cc4c535d293d23
-
SHA256
acadc18004851aa36a37701a59b485f013880cf371a7d9083444b480cf21c3ad
-
SHA512
d178a0c45ce3e3c11e389668a7e97b4e199b35d99d1560c2ff0e30769f3161d47290edde2a2675599453bde660d493fbf393893602eeb02b8db70167d3231040
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64eigu:q3Xu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2732 1760 powershell.exe 29 PID 1760 wrote to memory of 2732 1760 powershell.exe 29 PID 1760 wrote to memory of 2732 1760 powershell.exe 29 PID 1760 wrote to memory of 2732 1760 powershell.exe 29 PID 1760 wrote to memory of 2168 1760 powershell.exe 33 PID 1760 wrote to memory of 2168 1760 powershell.exe 33 PID 1760 wrote to memory of 2168 1760 powershell.exe 33 PID 1760 wrote to memory of 2168 1760 powershell.exe 33 PID 1760 wrote to memory of 2124 1760 powershell.exe 32 PID 1760 wrote to memory of 2124 1760 powershell.exe 32 PID 1760 wrote to memory of 2124 1760 powershell.exe 32 PID 1760 wrote to memory of 2124 1760 powershell.exe 32 PID 1760 wrote to memory of 2572 1760 powershell.exe 31 PID 1760 wrote to memory of 2572 1760 powershell.exe 31 PID 1760 wrote to memory of 2572 1760 powershell.exe 31 PID 1760 wrote to memory of 2572 1760 powershell.exe 31 PID 1760 wrote to memory of 2604 1760 powershell.exe 30 PID 1760 wrote to memory of 2604 1760 powershell.exe 30 PID 1760 wrote to memory of 2604 1760 powershell.exe 30 PID 1760 wrote to memory of 2604 1760 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9019caf9c14645b88f4c246b16bda29a.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:2168
-