Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2024 18:15

General

  • Target

    网络同居程序/bbs/admin/members.inc.ps1

  • Size

    85KB

  • MD5

    4d9a233e0bfcdfd902bfd9c59b34ed8b

  • SHA1

    c5f68dbfcbfc38d1c248bbaf6d0eb8ab49e122c3

  • SHA256

    dd1fdb4796a77184e71c297afffd45b896766312b5fba57040d259a825474076

  • SHA512

    0402c9822b78f38b2ddb580b59e1c99649592195f4bf1da546cb3de2999c2452b296804df0b81dc1f6bcef2d61f48ac0184c562f0e49672322e745ecb77a5328

  • SSDEEP

    1536:3w2y8mu09uzsKFJ1e6q7IdwpzyVmLmbauw4b:VZVFJ1Wn9yVLbanY

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\网络同居程序\bbs\admin\members.inc.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2596-4-0x000000001B250000-0x000000001B532000-memory.dmp

    Filesize

    2.9MB

  • memory/2596-5-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

    Filesize

    32KB

  • memory/2596-6-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-7-0x0000000002340000-0x00000000023C0000-memory.dmp

    Filesize

    512KB

  • memory/2596-8-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-9-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-10-0x0000000002340000-0x00000000023C0000-memory.dmp

    Filesize

    512KB