Resubmissions

15/04/2024, 17:37 UTC

240415-v66nksed8w 7

15/04/2024, 17:34 UTC

240415-v5ll1sed3z 7

15/04/2024, 17:30 UTC

240415-v3fmzsca66 3

15/04/2024, 17:27 UTC

240415-v1vdcseb8w 7

Analysis

  • max time kernel
    13s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 17:27 UTC

General

  • Target

    WindowsPowerShell/v1.0/Modules/EventTracingManagement/EventTracingManagement.ps1

  • Size

    5KB

  • MD5

    d329a4e3266d58f7508dd32b765d50a7

  • SHA1

    7b5dce66449fe09d60cc179cbe06771b03b6bfcc

  • SHA256

    f02fc225831c34c78f39c9e2f716b3a37cdc079c5c33ea08525970842abff291

  • SHA512

    8b9b16b35f93425517709395a46a16875e95ae0b956104e56a1251374a03fe11c36572adf2e9bb64f1afa12ede2b8983de4f99f3494d8c3329f5c941fcb76678

  • SSDEEP

    96:cqy0yikGvssZKUkKrrry1DuKKxTRFSigSiXfq7XNN:WJikcs+LkKlKKx9FEbyLNN

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\WindowsPowerShell\v1.0\Modules\EventTracingManagement\EventTracingManagement.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1260-4-0x000000001B4B0000-0x000000001B792000-memory.dmp

    Filesize

    2.9MB

  • memory/1260-5-0x0000000001D70000-0x0000000001D78000-memory.dmp

    Filesize

    32KB

  • memory/1260-6-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-7-0x0000000002620000-0x00000000026A0000-memory.dmp

    Filesize

    512KB

  • memory/1260-8-0x0000000002620000-0x00000000026A0000-memory.dmp

    Filesize

    512KB

  • memory/1260-9-0x0000000002620000-0x00000000026A0000-memory.dmp

    Filesize

    512KB

  • memory/1260-10-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-11-0x000000000262B000-0x0000000002692000-memory.dmp

    Filesize

    412KB

  • memory/1260-12-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.