Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
code.ps1
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
code.ps1
Resource
win10v2004-20240426-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
code.ps1
-
Size
1KB
-
MD5
50b665e08cf6333b7c1762f8a6c6a56c
-
SHA1
119f9859ff7dec61bdfe75c1a95f6c6994bda772
-
SHA256
fe00256d69450ab686b3aca74356b7916f44e9ded7c48418b8bf0db6d5b5748b
-
SHA512
3ec811f75772fd2a9ad382a894a09af694837458d4c3e9fbe4d38b1afb0a626f19aaacb2b82a1f6bb598948a2b5d0d6413e0a7aa9d383222deafb76b90673c2b
Score
3/10
Malware Config
Signatures
-
pid Process 2932 powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 296 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2932 wrote to memory of 296 2932 powershell.exe 29 PID 2932 wrote to memory of 296 2932 powershell.exe 29 PID 2932 wrote to memory of 296 2932 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\code.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- Gathers network information
PID:296
-