Analysis

  • max time kernel
    119s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 02:57 UTC

General

  • Target

    locales/sk.ps1

  • Size

    432KB

  • MD5

    c6c7396dbfb989f034d50bd053503366

  • SHA1

    089f176b88235cce5bca7abfcc78254e93296d61

  • SHA256

    439f7d6c23217c965179898754edcef8fd1248bdd9b436703bf1ff710701117a

  • SHA512

    1476963f47b45d2d26536706b7eeba34cfae124a3087f7727c4efe0f19610f94393012cda462060b1a654827e41f463d7226afa977654dcd85b27b7f8d1528eb

  • SSDEEP

    6144:vQt/WMWyqiLJcPXPk5ELALWaQlKDEmLFGR:vQYfyqiWPXM5ELALWaQlwdLE

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\locales\sk.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2672-4-0x000000001B2F0000-0x000000001B5D2000-memory.dmp

    Filesize

    2.9MB

  • memory/2672-6-0x0000000002220000-0x0000000002228000-memory.dmp

    Filesize

    32KB

  • memory/2672-7-0x0000000002570000-0x00000000025F0000-memory.dmp

    Filesize

    512KB

  • memory/2672-8-0x0000000002570000-0x00000000025F0000-memory.dmp

    Filesize

    512KB

  • memory/2672-9-0x0000000002570000-0x00000000025F0000-memory.dmp

    Filesize

    512KB

  • memory/2672-5-0x000007FEF5AE0000-0x000007FEF647D000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-10-0x000007FEF5AE0000-0x000007FEF647D000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-11-0x0000000002570000-0x00000000025F0000-memory.dmp

    Filesize

    512KB

  • memory/2672-12-0x000007FEF5AE0000-0x000007FEF647D000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.