Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
Python Crash Course A Hands-On, Project-Based Introduction to Programming (Eric Matthes) (Z-Library).ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Python Crash Course A Hands-On, Project-Based Introduction to Programming (Eric Matthes) (Z-Library).ps1
Resource
win10v2004-20231215-en
General
-
Target
Python Crash Course A Hands-On, Project-Based Introduction to Programming (Eric Matthes) (Z-Library).ps1
-
Size
5.4MB
-
MD5
7ef2134adeb488cea937761301822175
-
SHA1
8fdae91985fd4a83718ff773ae6bdd65874ba014
-
SHA256
43a8339bdb697134cb78ec95163dd400307c1bb153b939d6794637ca5e669e64
-
SHA512
fb41bc362d9861419f0185d5cb21d5e6efead32eedec8dbf96c7b4b2bd061006e45b9e018ba6038f319ce7090c961b0e1466ec45f801ea4f7319f00e81aea329
-
SSDEEP
98304:l4Ttuto2Mb2DEI+l/ktcTkU7777777brT7777777Jc777777r1gLonnVeeRCEEyC:lzodb2D9cTkU7777777brT7777777JcY
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2316 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2316 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\Python Crash Course A Hands-On, Project-Based Introduction to Programming (Eric Matthes) (Z-Library).ps1"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316