Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
68e24f54f98ff6bed8c25c7a08c1d224ed1ab378ac1d7fb9d232ebeaf3b283e1.ps1
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
68e24f54f98ff6bed8c25c7a08c1d224ed1ab378ac1d7fb9d232ebeaf3b283e1.ps1
Resource
win10v2004-20240426-en
3 signatures
150 seconds
General
-
Target
68e24f54f98ff6bed8c25c7a08c1d224ed1ab378ac1d7fb9d232ebeaf3b283e1.ps1
-
Size
1KB
-
MD5
3d2fb069db2dbda9d278fc79bdfdfbe8
-
SHA1
d64f798b2285fbc3c0c27bb033c80657a3b3d982
-
SHA256
68e24f54f98ff6bed8c25c7a08c1d224ed1ab378ac1d7fb9d232ebeaf3b283e1
-
SHA512
5fe4612b79f3d7234a081b4611742b0e3a1037183c7e9e05b6b3eb69f06bf998da45611dd0dba6905efdc6a2bbd2ca8ffa4a38268210c7f7b2cac364736033e3
Score
3/10
Malware Config
Signatures
-
pid Process 2964 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\68e24f54f98ff6bed8c25c7a08c1d224ed1ab378ac1d7fb9d232ebeaf3b283e1.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964