Analysis

  • max time kernel
    66s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 15:15

General

  • Target

    apps/admin/controller/content/ContentController.ps1

  • Size

    22KB

  • MD5

    d85dd0ee3818172db0e8c70b9280fbcc

  • SHA1

    396ae03635d3cf16332a4c86f2a6865746cc0e60

  • SHA256

    36a212dd6cc6406dd6ea4a1a5e75559a16f42ce62e2db9827ef15f3a7a1bbf36

  • SHA512

    533d5931c366e2f5db42ef2c272bd16c23cc1d36fd81a95ae5cdd3b0b54b84df95624eddb60e974c5454ed18dd12d10d2ad38d83b0a00129f7b55ede17bb63e8

  • SSDEEP

    384:vitnxyDlfiez6jsJzc2+BdpyDlMXWBsoE0:vitc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\apps\admin\controller\content\ContentController.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z3fqq5ny.dst.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1832-0-0x0000017DFF280000-0x0000017DFF2A2000-memory.dmp

    Filesize

    136KB

  • memory/1832-10-0x00007FFEDABF0000-0x00007FFEDB6B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1832-11-0x0000017DFF940000-0x0000017DFF950000-memory.dmp

    Filesize

    64KB

  • memory/1832-14-0x00007FFEDABF0000-0x00007FFEDB6B1000-memory.dmp

    Filesize

    10.8MB