Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.ps1
Resource
win7-20240611-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
New Text Document.ps1
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
Behavioral task
behavioral3
Sample
New Text Document.ps1
Resource
win11-20240508-en
banloadstealcvidardiscoverydownloaderdropperevasionexecutionpersistenceprivilege_escalationspywarestealertrojan
windows11-21h2-x64
30 signatures
150 seconds
General
-
Target
New Text Document.ps1
-
Size
1KB
-
MD5
fe729ca626d4d535d2aa601f0b3ba42e
-
SHA1
99ddeed15a2bd8e054e8cc734c36b148bcf7dca1
-
SHA256
5e15446118157a4109f642da012a275ce0f6203c5c8dbc8ca468c0c2c3a12425
-
SHA512
5028e95dc1e390d2bc92f945cd6ee3f2b04a5541f28cb1a5d214840bb658e96f403e04fade4075359f6922aebc3435c856d29cd10781db0aad63dafa7873484c
Score
3/10
Malware Config
Signatures
-
pid Process 1916 powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2280 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1916 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2280 1916 powershell.exe 29 PID 1916 wrote to memory of 2280 1916 powershell.exe 29 PID 1916 wrote to memory of 2280 1916 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\New Text Document.ps1"1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:2280
-