Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
e9ad648589aa3e15ce61c6a3be4fc98429581be738792ed17a713b4980c9a4a2.ps1
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
e9ad648589aa3e15ce61c6a3be4fc98429581be738792ed17a713b4980c9a4a2.ps1
-
Size
246B
-
MD5
f2e4351aa516a1f2e59ade5d9e7aa1d6
-
SHA1
1b751a2ee3af91c4cdf020914de19169fceb51ac
-
SHA256
e9ad648589aa3e15ce61c6a3be4fc98429581be738792ed17a713b4980c9a4a2
-
SHA512
ffc8ff99ea34d87efb5b869b1bc45acb5dd4557806afee79cdc32dc4fee66077ff4809d0918d266458c65044fc2516e8cd9aeac11a2a98128514de676d0a8e5c
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2580 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2580 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 2580 wrote to memory of 2644 2580 powershell.exe attrib.exe PID 2580 wrote to memory of 2644 2580 powershell.exe attrib.exe PID 2580 wrote to memory of 2644 2580 powershell.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e9ad648589aa3e15ce61c6a3be4fc98429581be738792ed17a713b4980c9a4a2.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/nkll/2⤵
- Views/modifies file attributes
PID:2644
-