Analysis
-
max time kernel
1559s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
wogyusxs.ps1
Resource
win7-20240221-en
windows7-x64
5 signatures
1800 seconds
Behavioral task
behavioral2
Sample
wogyusxs.ps1
Resource
win10v2004-20240426-en
windows10-2004-x64
11 signatures
1800 seconds
General
-
Target
wogyusxs.ps1
-
Size
244B
-
MD5
b7735e2c12896c76d8a89f83184c21e1
-
SHA1
40e06ee347758a0433d8f71a606d026322705c00
-
SHA256
b1a2cc5aa0c95a338d7c1245aafd6f7074429dcfe0022cd623ecd1e975c0cd0b
-
SHA512
b910ec27c7a21ec036f95e66574232811ad056b062e506c7e40d4cfa2ed93792d25bd422a8eec62c3aa45b152e95fc742403cea1e86aca05a4b81aa803871b42
Score
3/10
Malware Config
Signatures
-
pid Process 848 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 848 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 848 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 848 wrote to memory of 2460 848 powershell.exe 29 PID 848 wrote to memory of 2460 848 powershell.exe 29 PID 848 wrote to memory of 2460 848 powershell.exe 29 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2460 attrib.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\wogyusxs.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/owsa/2⤵
- Views/modifies file attributes
PID:2460
-