Analysis
-
max time kernel
50s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
umkglnks.ps1
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
umkglnks.ps1
-
Size
246B
-
MD5
f2e4351aa516a1f2e59ade5d9e7aa1d6
-
SHA1
1b751a2ee3af91c4cdf020914de19169fceb51ac
-
SHA256
e9ad648589aa3e15ce61c6a3be4fc98429581be738792ed17a713b4980c9a4a2
-
SHA512
ffc8ff99ea34d87efb5b869b1bc45acb5dd4557806afee79cdc32dc4fee66077ff4809d0918d266458c65044fc2516e8cd9aeac11a2a98128514de676d0a8e5c
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2364 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 2364 wrote to memory of 2772 2364 powershell.exe attrib.exe PID 2364 wrote to memory of 2772 2364 powershell.exe attrib.exe PID 2364 wrote to memory of 2772 2364 powershell.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\umkglnks.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/nkll/2⤵
- Views/modifies file attributes
PID:2772
-