Overview
overview
3Static
static
3Windows-Ac...tn.ps1
windows7-x64
3Windows-Ac...tn.ps1
windows10-2004-x64
3Windows-Ac...sn.ps1
windows7-x64
3Windows-Ac...sn.ps1
windows10-2004-x64
3Windows-Ac...te.exe
windows10-2004-x64
1Windows-Ac...lc.dll
windows7-x64
1Windows-Ac...lc.dll
windows10-2004-x64
1Windows-Ac...te.exe
windows10-2004-x64
1Windows-Ac...lc.dll
windows7-x64
1Windows-Ac...lc.dll
windows10-2004-x64
1Windows-Ac...or.bat
windows7-x64
1Windows-Ac...or.bat
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
Windows-Activator-main/BIN/entn.ps1
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Windows-Activator-main/BIN/entn.ps1
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Windows-Activator-main/BIN/entsn.ps1
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Windows-Activator-main/BIN/entsn.ps1
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Windows-Activator-main/BIN/x64/gatherosstate.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
Windows-Activator-main/BIN/x64/slc.dll
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
Windows-Activator-main/BIN/x64/slc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Windows-Activator-main/BIN/x86/gatherosstate.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Windows-Activator-main/BIN/x86/slc.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Windows-Activator-main/BIN/x86/slc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Windows-Activator-main/Windows-Activator.bat
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Windows-Activator-main/Windows-Activator.bat
Resource
win10v2004-20240709-en
General
-
Target
Windows-Activator-main/BIN/entn.ps1
-
Size
166B
-
MD5
4c5ea2375ac12581fc0a99fcf650f9a3
-
SHA1
ebfa44735e1254a1922a290dc14590efb5eae726
-
SHA256
d500ae4fca5eeccfb12da7a9940d785298d04d0483cccddfc5c0f60c404b61c3
-
SHA512
a5940811d091d254613742591635d251e3e219eae39786c05fbeb02bf9017345578f8edcff9afa781ce0c93c7d8d24d40d1e7abe291f975f23d7f2949f29e83e
Malware Config
Signatures
-
pid Process 1952 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1952 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Windows-Activator-main\BIN\entn.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952