Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
9956867cc5a0f5a7354947ef49e343ee3c8ecd72d0a36040a6b209d6bda1a2a2.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9956867cc5a0f5a7354947ef49e343ee3c8ecd72d0a36040a6b209d6bda1a2a2.ps1
Resource
win10v2004-20240802-en
General
-
Target
9956867cc5a0f5a7354947ef49e343ee3c8ecd72d0a36040a6b209d6bda1a2a2.ps1
-
Size
4KB
-
MD5
943a21ffef6436432a85fd1e67071e33
-
SHA1
d45311c15166311a86be1dfcae11ecca14d9b3c4
-
SHA256
9956867cc5a0f5a7354947ef49e343ee3c8ecd72d0a36040a6b209d6bda1a2a2
-
SHA512
9e941c3ca16f08f1555aa64479fbb7acb8e705639c969c921805cc228467a9f426e24eae97e5d3ea3fd1b82d7aac7f7ad18d3a8558f0972c89d901d664d8026c
-
SSDEEP
96:RB0lgBW69uISqlx2EyaCalCXqq6xYsTF2hC6G+:jHgOWElCalC6q6ys52jG+
Malware Config
Signatures
-
pid Process 2528 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2528 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9956867cc5a0f5a7354947ef49e343ee3c8ecd72d0a36040a6b209d6bda1a2a2.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528