Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 14:57

General

  • Target

    upload/bbs/admin/importdata.func.ps1

  • Size

    4KB

  • MD5

    6bbaad2f790f7158cddbeae1852d1041

  • SHA1

    bab49d5f5a40990456df84f26c808d58ed092103

  • SHA256

    b05f5fbf88092bd6f897339c7d13cc0b4bf16abc78a8a2e4bc2e5876887a88d8

  • SHA512

    77ecffc29515e6be5108093d0476b5d3a2021cee936328972bd7962674b89873cd4bc5a94e7281a02a585b81120c72d81e1679157c674bc52ac49ca9a4822596

  • SSDEEP

    96:dB3hDSBsBItj6GFQowztjpLKF3BEROLm2LS1w3NSqMjBOszp2q5PDwL/xAALfwsf:7lBIR6GVF3+PEq57GCywfg

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\upload\bbs\admin\importdata.func.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/964-11-0x000007FEF63B0000-0x000007FEF6D4D000-memory.dmp

    Filesize

    9.6MB

  • memory/964-10-0x000007FEF63B0000-0x000007FEF6D4D000-memory.dmp

    Filesize

    9.6MB

  • memory/964-9-0x0000000001F9B000-0x0000000002002000-memory.dmp

    Filesize

    412KB

  • memory/964-8-0x0000000001F94000-0x0000000001F97000-memory.dmp

    Filesize

    12KB

  • memory/964-7-0x000007FEF63B0000-0x000007FEF6D4D000-memory.dmp

    Filesize

    9.6MB

  • memory/964-6-0x0000000002960000-0x0000000002968000-memory.dmp

    Filesize

    32KB

  • memory/964-5-0x000000001B6B0000-0x000000001B992000-memory.dmp

    Filesize

    2.9MB

  • memory/964-4-0x000007FEF666E000-0x000007FEF666F000-memory.dmp

    Filesize

    4KB