Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 11:59

General

  • Target

    openx-2.8.7/etc/changes/migration_tables_core_540.ps1

  • Size

    11KB

  • MD5

    9993374c969e3298c4603faad77b0582

  • SHA1

    94725944b85059afc5f79ef4240148c1020e093f

  • SHA256

    1296ae0a82a739ca27537a19542563ef2051d251455b186fa023b8dc21f3840e

  • SHA512

    ac9886f59114f9abfc0813214b8c7387239b8f0bee8bee4e6c9c42c0072bfe470a65845b626cc46b01c4f4cc453a411888cc2b868bcc9f650abdd5ad4ee1ba85

  • SSDEEP

    192:ebunPoDX3KFE33NMrxoOJSVcYbqs1mzZDL:ebOPoDX3KFE33NMrAC

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\openx-2.8.7\etc\changes\migration_tables_core_540.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2132-4-0x000007FEF618E000-0x000007FEF618F000-memory.dmp

    Filesize

    4KB

  • memory/2132-6-0x00000000026E0000-0x00000000026E8000-memory.dmp

    Filesize

    32KB

  • memory/2132-5-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

    Filesize

    2.9MB

  • memory/2132-7-0x000007FEF5ED0000-0x000007FEF686D000-memory.dmp

    Filesize

    9.6MB

  • memory/2132-8-0x000007FEF5ED0000-0x000007FEF686D000-memory.dmp

    Filesize

    9.6MB

  • memory/2132-9-0x000007FEF5ED0000-0x000007FEF686D000-memory.dmp

    Filesize

    9.6MB

  • memory/2132-10-0x000007FEF5ED0000-0x000007FEF686D000-memory.dmp

    Filesize

    9.6MB

  • memory/2132-11-0x000007FEF5ED0000-0x000007FEF686D000-memory.dmp

    Filesize

    9.6MB

  • memory/2132-12-0x000007FEF5ED0000-0x000007FEF686D000-memory.dmp

    Filesize

    9.6MB