Resubmissions
01/06/2024, 22:49
240601-2rysrahf3t 1001/06/2024, 22:44
240601-2n2egahd8s 801/06/2024, 22:34
240601-2g9ghahg49 10Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
randomscript.ps1
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
randomscript.ps1
-
Size
1KB
-
MD5
322d6110a033d0aadfc40c14b8668fc7
-
SHA1
810a4c158b6016c990ac9653e89a6e9af79d578c
-
SHA256
22b607cba20413cd4363dd69d04d7ecda694ce3cf514f965a74c3605c7793248
-
SHA512
8e7c57e67c61ef9480f29232015a375718ae4defcf2603069da297dac0e4c4792f2f95371fda521c7fae8e077d38bdb34c5169d9fddc45064b37488a1d5e0699
Score
3/10
Malware Config
Signatures
-
pid Process 1280 powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2548 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1280 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2548 1280 powershell.exe 29 PID 1280 wrote to memory of 2548 1280 powershell.exe 29 PID 1280 wrote to memory of 2548 1280 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\randomscript.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:2548
-