Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
2fc1ec39637b7e1f46ed594c12c80fb8186b1fbbe6cd2893ffdc36690505a5a7.ps1
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2fc1ec39637b7e1f46ed594c12c80fb8186b1fbbe6cd2893ffdc36690505a5a7.ps1
Resource
win10v2004-20240730-en
General
-
Target
2fc1ec39637b7e1f46ed594c12c80fb8186b1fbbe6cd2893ffdc36690505a5a7.ps1
-
Size
553KB
-
MD5
12e2abc893dc6797d3fa02525df2b9e2
-
SHA1
10f78d47a520c02525d6a33ae9f3698c1de02413
-
SHA256
2fc1ec39637b7e1f46ed594c12c80fb8186b1fbbe6cd2893ffdc36690505a5a7
-
SHA512
b960fb6110be0f77e65054cae7f8d935cec4cd6f55a782fe0f6c7dcc5ee2630d229fdf0ab218fae856a2adb39b6b95237e4ed75cd707bd895d5ba2035e42a7a4
-
SSDEEP
1536:kDh8DyXBs84VhDEak0EyxWq0Z3IMUlaE4g7:kDhiyXBs84VhDEakbyxWq0Zk
Malware Config
Signatures
-
pid Process 828 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 828 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\2fc1ec39637b7e1f46ed594c12c80fb8186b1fbbe6cd2893ffdc36690505a5a7.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828