Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 03:47
Behavioral task
behavioral1
Sample
3b30be75a36539c7b9f9b4b8fb5c28b0.ps1
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b30be75a36539c7b9f9b4b8fb5c28b0.ps1
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3b30be75a36539c7b9f9b4b8fb5c28b0.ps1
-
Size
3KB
-
MD5
3b30be75a36539c7b9f9b4b8fb5c28b0
-
SHA1
2c4b0f7b6cd8a1932c43ee02d2df3dc9e93a7342
-
SHA256
1fdbb8e905dd0cb68c6c3eb817945c7db92f02b8891af1a0deaf75cbff37d419
-
SHA512
ce67a2f854002659d55e31819df0dc93b5872f2e786570c55b0ff242547efb168ee27fe0180bed0837557712861703f23f7db661edf6f36ffaf9a6297d4fef77
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 4 1620 powershell.exe 7 1620 powershell.exe 8 1620 powershell.exe 9 1620 powershell.exe 10 1620 powershell.exe 11 1620 powershell.exe 12 1620 powershell.exe -
pid Process 1620 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3b30be75a36539c7b9f9b4b8fb5c28b0.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620