Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
Invoke-ZeroLogon.ps1
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoke-ZeroLogon.ps1
Resource
win10v2004-20240426-en
3 signatures
150 seconds
General
-
Target
Invoke-ZeroLogon.ps1
-
Size
6KB
-
MD5
0e82005cb27f17d784b9e07001091da7
-
SHA1
55a872f31b9ba7efceff20fd2acd52d8c9e00bc4
-
SHA256
7d0bd18896417a2e051e24bca6e59cae0e2c45404d0c42ef9e070bc6424e44ef
-
SHA512
ce014dab83a97abd8815befd98acfa94ed0c1c8d151bc0bddebdf40f6e197c3c3c436dff403b809837e242ac438f5c340415ad6b1153d09078a22d424e1932c7
-
SSDEEP
96:QlS1ku6LBjDqqDby+427SSSxfDNLXMjbPOLhU+lnF/CSao:GfTB6k77yNLXMjb2ld1F6k
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2932 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Invoke-ZeroLogon.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2932-4-0x000007FEF5CBE000-0x000007FEF5CBF000-memory.dmpFilesize
4KB
-
memory/2932-5-0x000000001B640000-0x000000001B922000-memory.dmpFilesize
2.9MB
-
memory/2932-7-0x000007FEF5A00000-0x000007FEF639D000-memory.dmpFilesize
9.6MB
-
memory/2932-9-0x000007FEF5A00000-0x000007FEF639D000-memory.dmpFilesize
9.6MB
-
memory/2932-8-0x000007FEF5A00000-0x000007FEF639D000-memory.dmpFilesize
9.6MB
-
memory/2932-10-0x000007FEF5A00000-0x000007FEF639D000-memory.dmpFilesize
9.6MB
-
memory/2932-6-0x00000000026F0000-0x00000000026F8000-memory.dmpFilesize
32KB
-
memory/2932-11-0x000007FEF5A00000-0x000007FEF639D000-memory.dmpFilesize
9.6MB
-
memory/2932-12-0x000007FEF5A00000-0x000007FEF639D000-memory.dmpFilesize
9.6MB