Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2024 18:34

General

  • Target

    locales/et.ps1

  • Size

    468KB

  • MD5

    e7ea23d6304d5d600d884f4e3b3cb2d7

  • SHA1

    99fbef7eb1bde7df398cce9faf6c7c357769334a

  • SHA256

    292eb18ec61502b0e952b447f73a66143c56dd95f170981945e5aab53a6b32b3

  • SHA512

    23dfa1161d11faf440241b1f48f2ddbc8ec086a8e18da351734656551f0f54fe4c94b490c0d3ecc378a3de7f7713a1626a7a6c21da2500b9597b44fd08197d50

  • SSDEEP

    6144:5oD1EPHeXyxhmokCJ1HNRSnQp+LNmW7Fb0cmFotp43rPYJpiT/d25hjm43LPvCKt:5i1vokAwQ8FFmFotm25hjLx

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\locales\et.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2720-4-0x000000001B300000-0x000000001B5E2000-memory.dmp

    Filesize

    2.9MB

  • memory/2720-5-0x00000000022F0000-0x00000000022F8000-memory.dmp

    Filesize

    32KB

  • memory/2720-6-0x000007FEF6070000-0x000007FEF6A0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2720-7-0x0000000002AA0000-0x0000000002B20000-memory.dmp

    Filesize

    512KB

  • memory/2720-9-0x0000000002AA0000-0x0000000002B20000-memory.dmp

    Filesize

    512KB

  • memory/2720-8-0x0000000002AA0000-0x0000000002B20000-memory.dmp

    Filesize

    512KB

  • memory/2720-10-0x000007FEF6070000-0x000007FEF6A0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2720-11-0x0000000002AA0000-0x0000000002B20000-memory.dmp

    Filesize

    512KB

  • memory/2720-12-0x000007FEF6070000-0x000007FEF6A0D000-memory.dmp

    Filesize

    9.6MB