Analysis

  • max time kernel
    137s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-04-2024 18:21

General

  • Target

    Vega X Dev Mode/bin/commservice/files/node_modules/.bin/jake.ps1

  • Size

    785B

  • MD5

    6ba6f388bae7099de486d4c9add04dbd

  • SHA1

    ec62c15c2d24c0de1402b7a4c2a9f3351cc0e859

  • SHA256

    5828a38682c817d7cb6f8047a8b95104da47b5fb0c478416b08234bd361b7228

  • SHA512

    5c3ccd7d9b06f9c4ee54d2270fab5ebd00e2f80a0939395ad77191f2b01a567face01a82efae4424bdaf66093cd60ec54cb233954041d288eb663b3c670ef2ac

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\Vega X Dev Mode\bin\commservice\files\node_modules\.bin\jake.ps1"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4mhenmxp.xpz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3468-9-0x00000133FDC60000-0x00000133FDC82000-memory.dmp

    Filesize

    136KB

  • memory/3468-10-0x00007FF957120000-0x00007FF957BE1000-memory.dmp

    Filesize

    10.8MB

  • memory/3468-12-0x00000133FD950000-0x00000133FD960000-memory.dmp

    Filesize

    64KB

  • memory/3468-11-0x00000133FD950000-0x00000133FD960000-memory.dmp

    Filesize

    64KB

  • memory/3468-13-0x00000133FD950000-0x00000133FD960000-memory.dmp

    Filesize

    64KB

  • memory/3468-16-0x00007FF957120000-0x00007FF957BE1000-memory.dmp

    Filesize

    10.8MB