Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 20:16
Behavioral task
behavioral1
Sample
childdcscript2.ps1
Resource
win7-20240221-en
windows7-x64
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
childdcscript2.ps1
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
300 seconds
General
-
Target
childdcscript2.ps1
-
Size
1KB
-
MD5
4e76a15aa7886cb6323a8e417c91a0fa
-
SHA1
a49cb723e567bf13e379bc38b12d77fd56bd0636
-
SHA256
5cebcbf67061e7d243a9a54e4b0d27e25337dfd1ee9fcfb61ae9bb3ddd89870f
-
SHA512
e530c3de0fb9cc65f30e15b013ef0ea17925e6b390d8087039bdc199567be99e8fd1bf5e2793365d4b723eecba80d6e800233817a0f6d1c3cc8f04f766290a04
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2100 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2100 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2100-4-0x000007FEF600E000-0x000007FEF600F000-memory.dmpFilesize
4KB
-
memory/2100-5-0x000000001B740000-0x000000001BA22000-memory.dmpFilesize
2.9MB
-
memory/2100-7-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmpFilesize
9.6MB
-
memory/2100-8-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmpFilesize
9.6MB
-
memory/2100-9-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmpFilesize
9.6MB
-
memory/2100-6-0x0000000001FF0000-0x0000000001FF8000-memory.dmpFilesize
32KB
-
memory/2100-10-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmpFilesize
9.6MB
-
memory/2100-11-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmpFilesize
9.6MB
-
memory/2100-12-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmpFilesize
9.6MB