Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
rmtixfwn.ps1
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
rmtixfwn.ps1
-
Size
243B
-
MD5
b37f28fd9b296552224c51f74b89321d
-
SHA1
8fbd4979d302f20cb6133140391d3fc32644c61e
-
SHA256
173874e3043653514f5c49e0fec9473043c6cf9f6c441d23efd8555f0e9f1b90
-
SHA512
246906359d2e8bd442c4a046856cc0f8e2d16a142bde93bcfc4c334d3e9b3af55cd3ce4c89a5c088e3e1e914bbd3d4909cbf33c9f9a90343f4bd25c783e67f9e
Score
3/10
Malware Config
Signatures
-
pid Process 2084 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2084 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2620 2084 powershell.exe 29 PID 2084 wrote to memory of 2620 2084 powershell.exe 29 PID 2084 wrote to memory of 2620 2084 powershell.exe 29 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2620 attrib.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\rmtixfwn.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/bwjv/2⤵
- Views/modifies file attributes
PID:2620
-