Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 17:22

General

  • Target

    Dolphin-x64/Sys/GameSettings/G2RE52.ps1

  • Size

    1KB

  • MD5

    27e2ac45416c3e04fe1bcd7ffe5f8812

  • SHA1

    93b7588a02ec5a9280f68d1b10ee3a285fb74ed7

  • SHA256

    15e3100848c220e82f1c62b818a2dc444161c999889cf8e81a553b509d6885ae

  • SHA512

    d83a7967668656926f6ee095c140b1d58573b53ae34cd7afc900bfce9369c46a56951646315071af536599304cf1e207ed2439ccd2a5e7d37e1a5e3fe663f3ec

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Dolphin-x64\Sys\GameSettings\G2RE52.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2368-4-0x000007FEF5A0E000-0x000007FEF5A0F000-memory.dmp

    Filesize

    4KB

  • memory/2368-5-0x000000001B650000-0x000000001B932000-memory.dmp

    Filesize

    2.9MB

  • memory/2368-6-0x0000000001E90000-0x0000000001E98000-memory.dmp

    Filesize

    32KB

  • memory/2368-7-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2368-8-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2368-9-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2368-10-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2368-11-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2368-12-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB