Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
testie.ps1
Resource
win7-20240705-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
testie.ps1
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
testie.ps1
-
Size
263B
-
MD5
4b406fd3f8cf6c84070745ba7c810f5e
-
SHA1
46498bc753ad7398e449f36dfa57dc1aaa44d1e1
-
SHA256
111a76dec326a5d2d9a530f7de452f7aafcbdf08c9feb1f8d894f528ed60d8a1
-
SHA512
b77ab8bceb7d9ced7574552555a4ef2066d46fb408c81d0abbf91339ca5be61d11abe6d36d72ab1305ae76a6967321695f1fe98122b0053cdb84654d5e16cc48
Score
3/10
Malware Config
Signatures
-
pid Process 2708 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2708 powershell.exe 2708 powershell.exe 2708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2708 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2648 2708 powershell.exe 31 PID 2708 wrote to memory of 2648 2708 powershell.exe 31 PID 2708 wrote to memory of 2648 2708 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\testie.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe" Admin2⤵PID:2648
-