Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
file.ps1
Resource
win7-20240220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.ps1
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
file.ps1
-
Size
226B
-
MD5
336f65fc75b3f514825053079f278ee3
-
SHA1
d8f4573726bef771ff04a9275ffe3d036891ceb6
-
SHA256
8ce9ee5ed4fa6d2bce592aa3fa47795395eb801576d3664572652848df0fe951
-
SHA512
4835a2e6b7a5f78d4705ea75b7aa0de2f2c6a4f9530c440ff28165c6eb9948727c6359a1fdd54cc113b940ab5e7d137721c18c197df0233f7fe7ceba6abb004e
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepid process 3012 powershell.exe 3012 powershell.exe 3012 powershell.exe 3012 powershell.exe 3012 powershell.exe 3012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3012 powershell.exe