Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 14:20
Static task
static1
Behavioral task
behavioral1
Sample
wogyusxs.ps1
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
wogyusxs.ps1
Resource
win10v2004-20240508-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
wogyusxs.ps1
-
Size
244B
-
MD5
b7735e2c12896c76d8a89f83184c21e1
-
SHA1
40e06ee347758a0433d8f71a606d026322705c00
-
SHA256
b1a2cc5aa0c95a338d7c1245aafd6f7074429dcfe0022cd623ecd1e975c0cd0b
-
SHA512
b910ec27c7a21ec036f95e66574232811ad056b062e506c7e40d4cfa2ed93792d25bd422a8eec62c3aa45b152e95fc742403cea1e86aca05a4b81aa803871b42
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1460 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 1460 wrote to memory of 2144 1460 powershell.exe attrib.exe PID 1460 wrote to memory of 2144 1460 powershell.exe attrib.exe PID 1460 wrote to memory of 2144 1460 powershell.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\wogyusxs.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/owsa/2⤵
- Views/modifies file attributes
PID:2144
-