Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 01:00

General

  • Target

    03ca83fc2857c289d2e3c952c7a7330e37bb58fc4e492d4a460511088d1c2839.ps1

  • Size

    43KB

  • MD5

    cd382d2f7f3e03da3f35fcc2c31014e3

  • SHA1

    a2f0e94890b7ffaadc9013d5b7b4b024f295fdfb

  • SHA256

    03ca83fc2857c289d2e3c952c7a7330e37bb58fc4e492d4a460511088d1c2839

  • SHA512

    fea3302f5ec1dd81c039bef1bfd9dd5ea4d4a1af9bbc1daf125c9f5627fc13ff3adea6be0501473a1b71ad5c592170d606cc6488dc221877a39a397f022201f7

  • SSDEEP

    384:WYJS+d00Z0CtJwhdGFgzEkUwpr7aF6KW1zImuLNkSaa1er4YUnibfdzLhwemjbzP:f0FQAakAq04r8FM1A

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\03ca83fc2857c289d2e3c952c7a7330e37bb58fc4e492d4a460511088d1c2839.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -sta -file C:\Users\Admin\AppData\Local\Temp\03ca83fc2857c289d2e3c952c7a7330e37bb58fc4e492d4a460511088d1c2839.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2UWPXPWDQTGHVZK66ETC.temp

    Filesize

    7KB

    MD5

    32a1bfa8348e22953d6f9742a62413f3

    SHA1

    a29fb88aeecf82ce9382e977b67038c1b90516bf

    SHA256

    c8968a1ac6d3226cf05a856e5d3174f8259dd56ffe64e8bd735022f3a86dc0e9

    SHA512

    3b21cbfb6dd66ad727cc447eebcff0eadee1d3cfb40b33e4160de81afd53dbf5d5e8e8d3270dc9bd62ac747b6b77a8331ee1aa6a78507a99c8b62c43ddbf15ed

  • memory/2208-16-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-7-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-25-0x000007FEF636E000-0x000007FEF636F000-memory.dmp

    Filesize

    4KB

  • memory/2208-24-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-9-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-10-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-5-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

    Filesize

    2.9MB

  • memory/2208-4-0x000007FEF636E000-0x000007FEF636F000-memory.dmp

    Filesize

    4KB

  • memory/2208-8-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-6-0x0000000002860000-0x0000000002868000-memory.dmp

    Filesize

    32KB

  • memory/2360-26-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2360-20-0x0000000002990000-0x000000000299E000-memory.dmp

    Filesize

    56KB

  • memory/2360-21-0x000000001B980000-0x000000001B9DA000-memory.dmp

    Filesize

    360KB

  • memory/2360-22-0x000000001C070000-0x000000001C146000-memory.dmp

    Filesize

    856KB

  • memory/2360-23-0x000000001CAE0000-0x000000001CB66000-memory.dmp

    Filesize

    536KB

  • memory/2360-18-0x0000000002960000-0x000000000296C000-memory.dmp

    Filesize

    48KB

  • memory/2360-19-0x0000000002970000-0x000000000298C000-memory.dmp

    Filesize

    112KB

  • memory/2360-17-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB