Resubmissions

16/06/2024, 07:20 UTC

240616-h6f2psycpm 10

16/06/2024, 07:20 UTC

240616-h6f2psvbka 10

16/06/2024, 07:20 UTC

240616-h6f2psycpl 10

16/06/2024, 07:20 UTC

240616-h6f2psycpk 10

16/06/2024, 07:20 UTC

240616-h6f2psvbjh 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnr 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnq 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnp 10

16/06/2024, 07:20 UTC

240616-h6fqyavbjg 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnn 10

Analysis

  • max time kernel
    1718s
  • max time network
    1728s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16/06/2024, 07:20 UTC

General

  • Target

    file01 - copia (9).ps1

  • Size

    462B

  • MD5

    5e2dca825bed214a14705357df13d8d6

  • SHA1

    04f20b1094e5e905bcbcdfc0f1279f6a6e2bbb9e

  • SHA256

    b45546367df23b2459a55ffa753ad4d66f8588263f87c339fb81cde87c3ffba4

  • SHA512

    70a31874a475560704829224c71d6e9f01d6dc3bfe5b1f453ff817753f7a6d1ed51249481cd14e8adae497ad6ddfbe8b4e9556556886dd97c9587b24b0701501

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\file01 - copia (9).ps1"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3744

Network

  • flag-us
    DNS
    github.com
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    github.com
    IN A
  • flag-us
    DNS
    github.com
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    github.com
    IN A
  • flag-us
    DNS
    github.com
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    github.com
    IN A
  • flag-us
    DNS
    github.com
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    github.com
    IN A
  • flag-us
    DNS
    github.com
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    github.com
    IN A
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
No results found
  • 8.8.8.8:53
    github.com
    dns
    powershell.exe
    280 B
    5

    DNS Request

    github.com

    DNS Request

    github.com

    DNS Request

    github.com

    DNS Request

    github.com

    DNS Request

    github.com

  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    330 B
    5

    DNS Request

    8.8.8.8.in-addr.arpa

    DNS Request

    8.8.8.8.in-addr.arpa

    DNS Request

    8.8.8.8.in-addr.arpa

    DNS Request

    8.8.8.8.in-addr.arpa

    DNS Request

    8.8.8.8.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_exifkbqz.irc.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3744-0-0x00007FF84EE23000-0x00007FF84EE25000-memory.dmp

    Filesize

    8KB

  • memory/3744-6-0x0000029FC6D00000-0x0000029FC6D22000-memory.dmp

    Filesize

    136KB

  • memory/3744-10-0x00007FF84EE20000-0x00007FF84F8E2000-memory.dmp

    Filesize

    10.8MB

  • memory/3744-11-0x00007FF84EE20000-0x00007FF84F8E2000-memory.dmp

    Filesize

    10.8MB

  • memory/3744-12-0x00007FF84EE20000-0x00007FF84F8E2000-memory.dmp

    Filesize

    10.8MB

  • memory/3744-13-0x00007FF84EE20000-0x00007FF84F8E2000-memory.dmp

    Filesize

    10.8MB

  • memory/3744-14-0x00007FF84EE23000-0x00007FF84EE25000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.