Resubmissions

15-04-2024 17:37

240415-v66nksed8w 7

15-04-2024 17:34

240415-v5ll1sed3z 7

15-04-2024 17:30

240415-v3fmzsca66 3

15-04-2024 17:27

240415-v1vdcseb8w 7

Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 17:37

General

  • Target

    WindowsPowerShell/v1.0/Modules/SmbShare/SmbScriptModule.ps1

  • Size

    8KB

  • MD5

    a2c239dfae261e44f9de4cb7b687a119

  • SHA1

    cc620907f18ad1219645ed4b8496cae48d2f857b

  • SHA256

    a13eabc75b65e7dc8f69f94ad5883a09a518bd85d892f8f75c58e912d7923cda

  • SHA512

    897b541c154f4154bc66196338b1bba653fdd978c022d0f11b37fdc6fba33369b16f3330ae9910a970885fa13792ad936909fc4e0a689f96b6cdc8f351179086

  • SSDEEP

    96:ex+GSox0OwBxCrrYxup8LlYUa18LVa8J68Lk5Sqdkc6s1XwKTSwG48ilwiHIHCER:Q+y0OwvCeu+lYYVaSJq3fcf4bwdkW

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\WindowsPowerShell\v1.0\Modules\SmbShare\SmbScriptModule.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1580-4-0x000000001B600000-0x000000001B8E2000-memory.dmp

    Filesize

    2.9MB

  • memory/1580-5-0x0000000002720000-0x0000000002728000-memory.dmp

    Filesize

    32KB

  • memory/1580-6-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1580-7-0x0000000002CD0000-0x0000000002D50000-memory.dmp

    Filesize

    512KB

  • memory/1580-8-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1580-9-0x0000000002CD0000-0x0000000002D50000-memory.dmp

    Filesize

    512KB

  • memory/1580-10-0x0000000002CD0000-0x0000000002D50000-memory.dmp

    Filesize

    512KB

  • memory/1580-11-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB