Malware Analysis Report

2024-10-16 06:30

Sample ID 240613-sdapbstdna
Target test.ps1
SHA256 715d3dc6ccb9368fee105911f79e183005dc663af1e2ab1ec21e7097f96534f9
Tags
execution
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

715d3dc6ccb9368fee105911f79e183005dc663af1e2ab1ec21e7097f96534f9

Threat Level: Likely benign

The file test.ps1 was found to be: Likely benign.

Malicious Activity Summary

execution

Command and Scripting Interpreter: PowerShell

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 15:00

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 15:00

Reported

2024-06-13 15:00

Platform

win10-20240611-it

Max time kernel

1s

Command Line

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\test.ps1

Signatures

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\test.ps1

Network

N/A

Files

memory/2156-3-0x00007FFAA1753000-0x00007FFAA1754000-memory.dmp

memory/2156-5-0x00000234E1900000-0x00000234E1982000-memory.dmp

memory/2156-6-0x00000234C93F0000-0x00000234C9412000-memory.dmp

memory/2156-7-0x00000234C93E0000-0x00000234C93F0000-memory.dmp

memory/2156-9-0x00007FFAA1750000-0x00007FFAA213C000-memory.dmp

memory/2156-8-0x00000234E1BF0000-0x00000234E1CF0000-memory.dmp

memory/2156-12-0x00007FFAA1750000-0x00007FFAA213C000-memory.dmp

memory/2156-13-0x00000234E1CF0000-0x00000234E1D66000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wxtzrzys.qrp.ps1

MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA512 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

memory/2156-34-0x00007FFAA1750000-0x00007FFAA213C000-memory.dmp

memory/2156-38-0x00007FFAA1750000-0x00007FFAA213C000-memory.dmp