Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
99b661c995248828cd7939dc7678fd12ef8e88d16e2354615262f20d920d4389.ps1
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
99b661c995248828cd7939dc7678fd12ef8e88d16e2354615262f20d920d4389.ps1
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
99b661c995248828cd7939dc7678fd12ef8e88d16e2354615262f20d920d4389.ps1
-
Size
1KB
-
MD5
4a70b1e4cb57c99502d89cdbbed48343
-
SHA1
19df5bcd0ccff14681cfc4d0c4c577ad7daef7a9
-
SHA256
99b661c995248828cd7939dc7678fd12ef8e88d16e2354615262f20d920d4389
-
SHA512
9829af140d4b7ced432a6f2a65d1fec517c23197c6f08cc4d8a604e8cff5293c49f2d2cbb31913814c0dad9f6f5c0cd460e8da6b46bf59842cf3e8695e7e8a1d
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exeflow pid process 4 1704 powershell.exe 5 1704 powershell.exe 6 1704 powershell.exe 7 1704 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1704 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\99b661c995248828cd7939dc7678fd12ef8e88d16e2354615262f20d920d4389.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704