Analysis

  • max time kernel
    135s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 19:17

General

  • Target

    locales/th.ps1

  • Size

    1.0MB

  • MD5

    7512a162ea0b65dd9477ac8c190136b9

  • SHA1

    ae5fbce9516882a0d58da9ebee3c767c7ba4c305

  • SHA256

    d01ecd4edecf1809d5c2133366df2502a4621e88d894817e80b913f3a0926fa4

  • SHA512

    425fd803cd3ed9589df5d04bb8ca4b62af0e573301d31c48a1a05bf3b707a0672e1a033965946223e5873a98eb3c9d52bcdcc1296a08cb4971d0b1b6d2e95eb7

  • SSDEEP

    12288:7UTfeN9LyZYArTJz1L/L1XPhHsbhRy1cW+v1H5UJEyL3ftj8wlz9eTRo98GkK9u4:7UTNC5y5h

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\locales\th.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1012-1-0x000001C329290000-0x000001C3292B2000-memory.dmp

    Filesize

    136KB

  • memory/1012-2-0x00007FFE14380000-0x00007FFE14E41000-memory.dmp

    Filesize

    10.8MB

  • memory/1012-3-0x00007FFE14380000-0x00007FFE14E41000-memory.dmp

    Filesize

    10.8MB