Resubmissions
12-07-2024 20:04
240712-ythb1ayanm 312-07-2024 20:04
240712-ytcfrayank 112-07-2024 20:03
240712-ys69qsyamp 112-07-2024 20:03
240712-ys2dgsyalp 112-07-2024 13:24
240712-qnd4dsxele 3Analysis
-
max time kernel
316s -
max time network
316s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
trigger.ps1
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
trigger.ps1
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
trigger.ps1
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
trigger.ps1
Resource
macos-20240711.1-en
General
-
Target
trigger.ps1
-
Size
11B
-
MD5
fb795feaa7259419ddde81a0035cfbef
-
SHA1
5473681b4ea7167701193cf79bf0162b9d3639b5
-
SHA256
385dca79ea2fa20b0c2cbb78979466105ff2f492a27ab3c9f8e8ab1cc60f74d8
-
SHA512
702ea7cb2fc4fea5f9e475ae34be5d1191974c1b6a34d3fe8f00be5765683184d8481e62597e9fd0909e08ed9a2d7d96781dde957fbc30772416071a4049455e
Malware Config
Signatures
-
pid Process 672 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 672 powershell.exe