Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
NHLRYQURTHYLDPQY.ps1
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
NHLRYQURTHYLDPQY.ps1
-
Size
559KB
-
MD5
2684613c1f5db2fd250bc0551887419c
-
SHA1
1a29e5c18976095f7fe5719bd3d16c36fd3db5fd
-
SHA256
41ae3eb86359c776ac1b40faf1eb43eb7d874cbf233444aa3af554257d64e62a
-
SHA512
aea057c3526c8b8d7177f94cc32f5c5c021529461f7f657ac36a26da584dbaa92ac8fd976b6d66177d48d22b52cace678186885afe9cc24c4da6c6cb0cf7df33
-
SSDEEP
1536:kDh8DyXBs84VhDEak0EyxWq0JnZcjCuPSWaZauagEGG8dw:kDhiyXBs84VhDEakbyxWq0JSv
Score
3/10
Malware Config
Signatures
-
pid Process 2652 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\NHLRYQURTHYLDPQY.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652