Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
file01.ps1
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
file01.ps1
Resource
win10v2004-20240419-en
General
-
Target
file01.ps1
-
Size
400B
-
MD5
13a74bcb50f0f5bbc6b4e744530d99d0
-
SHA1
2132e6c9e95ac82e4d5f2c4fb837e2768da41385
-
SHA256
8008c585f318087f216d9d635b4073e162c2176c1ca174cac7a5e6d59bdbdafa
-
SHA512
c6e0182536fef3b84ff3f94aede77dfddd66a0f4da71b0e47a05abcc7663898282619ff9fd997b6cb44385a4f56fff3f3b5d467dce89eaf7360638d31c805c51
Malware Config
Signatures
-
pid Process 1916 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1916 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2696 1916 powershell.exe 29 PID 1916 wrote to memory of 2696 1916 powershell.exe 29 PID 1916 wrote to memory of 2696 1916 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\file01.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\miwq1ayr.cmdline"2⤵PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5f46be35fe83f82c629d5e6753eb00266
SHA1e91ce0521b0b107aceec1baaf062cd8ef023de81
SHA2569680e34de338762327b966cf8b12cc97336324c3a30101e9c87822abb5eac691
SHA5128424c967957f8b747dd408997038bd3f7ef2160308d229efe16113c2492cd0c15fb328ac9c7a8e0cf6d72672c0458a4cac7e6aef2c64298f4acf4ff93b8ecf9f
-
Filesize
309B
MD5b82bfce616aceab10b5c71caa57ae4c0
SHA18737632510c818d75c141dbc4ad7b497ff390167
SHA2562ef18acf87b38e3ba2b54a2b09ff57febf48a8ea626bcea97a785a78ad5c05f6
SHA512496a73bc738bc2eb87522da016f0dce24d276f194f7eb27ed6c1f9f06bed7fc7ac1ca77f601fa616ebf509c685c215885973bdf6e819e72015ed03d89e9a125f