Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
temp.ps1
Resource
win7-20240215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
temp.ps1
Resource
win10v2004-20240226-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
temp.ps1
-
Size
1KB
-
MD5
0acec0b97e631ee11607cdfe7355cc66
-
SHA1
7fb794279aaae130e9ba5d6e7d3afe7e65836e6a
-
SHA256
4e34052fe0048e3d2a30feb1da3a2c75c908d19997b38ec0168f5f509f801d73
-
SHA512
e99116bab7ddc4fcc2d1d483b330d6c324aa59d4431d9a125da54d25f81e5163bf1ad62d9b6a0938879430c3ad6ef96fcfe880ff6a281598f82e57ce0c29a443
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\temp.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2616