Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 17:22

General

  • Target

    Dolphin-x64/Sys/GameSettings/GCCE01.ps1

  • Size

    8KB

  • MD5

    6cf67a3886bfbbea50eaef7e4e6cb9b8

  • SHA1

    c3e409bbdc44bfb7913f065ab23364e46c5d9e08

  • SHA256

    17daa1ad21c59c38cae9c5cd0d7283e7e6bc69dadc80142cba4012fe3d658e15

  • SHA512

    ae6f6c9cde7ac4c7ef6bc7559aaf24ab2cbb29f7eb734a75c5a30e927f1d97e85dc7a7c08c596afb902f48fa37eb6737404190c4a1a072c648554726f8b37d49

  • SSDEEP

    96:ZoLjcas9uykiSY8wbd0t77egpsgFWfadIhb:ZoLjcap9Yq9dQawb

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Dolphin-x64\Sys\GameSettings\GCCE01.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2568-4-0x000007FEF5F9E000-0x000007FEF5F9F000-memory.dmp

    Filesize

    4KB

  • memory/2568-5-0x000000001B760000-0x000000001BA42000-memory.dmp

    Filesize

    2.9MB

  • memory/2568-7-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

    Filesize

    9.6MB

  • memory/2568-6-0x00000000027E0000-0x00000000027E8000-memory.dmp

    Filesize

    32KB

  • memory/2568-8-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

    Filesize

    9.6MB

  • memory/2568-9-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

    Filesize

    9.6MB

  • memory/2568-10-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

    Filesize

    9.6MB

  • memory/2568-11-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

    Filesize

    9.6MB

  • memory/2568-12-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

    Filesize

    9.6MB