Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
9d05f72c586b7ba405c30117a9fe9550c44e7a2248f868e08268443abe1a3ce8.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d05f72c586b7ba405c30117a9fe9550c44e7a2248f868e08268443abe1a3ce8.ps1
Resource
win10v2004-20240802-en
General
-
Target
9d05f72c586b7ba405c30117a9fe9550c44e7a2248f868e08268443abe1a3ce8.ps1
-
Size
12KB
-
MD5
cd7870e220fad26aae6ae1d03fa354b8
-
SHA1
e011bc894a439d126718aeacf6c347ccdb08c72d
-
SHA256
9d05f72c586b7ba405c30117a9fe9550c44e7a2248f868e08268443abe1a3ce8
-
SHA512
03388389cbbd8dc5c77c4bc1ec9d943ad469e387501375c86b84a0098dc7e566e1f7aff9e166feb8132858d384c4a98d0e294f93e3e756337a894d59c03ec99d
-
SSDEEP
192:7kPRNFcBiQS0DMO4k2xVflo2LZ4koB3lby8qB2H5oB3lbyAK2HmhoB3lbypK2HBc:7kLKOde6z4rpm3
Malware Config
Signatures
-
pid Process 2420 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2420 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2420 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9d05f72c586b7ba405c30117a9fe9550c44e7a2248f868e08268443abe1a3ce8.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420