Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
0aa75efa4d6847f998109301da50ff119187507f08b3119148b9db5844e7c703.ps1
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
0aa75efa4d6847f998109301da50ff119187507f08b3119148b9db5844e7c703.ps1
-
Size
12.0MB
-
MD5
8520b4800af18dc9288264498350c16d
-
SHA1
3d3c2daf837a5faca7dbff7de7b12b6c7a066291
-
SHA256
0aa75efa4d6847f998109301da50ff119187507f08b3119148b9db5844e7c703
-
SHA512
9822c61c1c844915d6645d42319a5909bc1efb16966cad80bd153acbe02fdbdf76c546b9f341561358ab163c62a3160ad5b569efd7b976fbda502aba1378c405
-
SSDEEP
24576:rSUMUHnRI2kiE/ef9E+N45KZ9EqWlmevbBel/Yvn0lFwuPiJ3/V8eRSLXs3z+DWv:2vXS+5kmoQTskvKSpd1iwV0jl5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2852 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0aa75efa4d6847f998109301da50ff119187507f08b3119148b9db5844e7c703.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852