Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 16:35

General

  • Target

    c25759e6083dd4bf592a6da2063c45def5adc9a6ef2ed15820128a0d838f70fe.ps1

  • Size

    449B

  • MD5

    c2f46db865b0ba6ef8f9385cf458a56e

  • SHA1

    0b2f94fcf38ef15f59bb86a3296b7da514b4ac4e

  • SHA256

    c25759e6083dd4bf592a6da2063c45def5adc9a6ef2ed15820128a0d838f70fe

  • SHA512

    9927b209ca26e3243fac9f003c6af7663ba84405346fbdb66c6f401387cd20ea3f99d63d0858ebdc76f2e6bc722d41e2a1f599bc6f7d97b0687dba95dea31b39

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c25759e6083dd4bf592a6da2063c45def5adc9a6ef2ed15820128a0d838f70fe.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2972-4-0x000000001B640000-0x000000001B922000-memory.dmp

    Filesize

    2.9MB

  • memory/2972-5-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

    Filesize

    32KB

  • memory/2972-6-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2972-7-0x0000000002D60000-0x0000000002DE0000-memory.dmp

    Filesize

    512KB

  • memory/2972-8-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2972-9-0x0000000002D60000-0x0000000002DE0000-memory.dmp

    Filesize

    512KB

  • memory/2972-10-0x0000000002D60000-0x0000000002DE0000-memory.dmp

    Filesize

    512KB

  • memory/2972-11-0x0000000002D60000-0x0000000002DE0000-memory.dmp

    Filesize

    512KB

  • memory/2972-12-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB