Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 08:55

General

  • Target

    TorrentMonitor-master/class/Database.class.ps1

  • Size

    42KB

  • MD5

    3e374dc1e08dc3b0d30d9a987822eab9

  • SHA1

    a89e3115780d0afa4b8c93612bc79b3c090c71b8

  • SHA256

    4b46ed2c2a182386ff94fb7ffe25825cd871d63ab7aa413265721f8e59cae1cc

  • SHA512

    e963c509ae2c62c4b4e66bd8e728bf768a5b8a322994893eb9eb270f7c7579e55109e058dd129e7f1ea5286ceb31e9b0d45ca75d50221741b4f7d10b92d24d00

  • SSDEEP

    384:X/+y1p5Emvra8qZ+S0uM0oJ7s9+wvTWLxP/BfIcHBfkrCqCMvfM5c81cqsaoYScj:XBpDvVwvTkKSfE59YUU

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\TorrentMonitor-master\class\Database.class.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2112-4-0x000007FEF5AAE000-0x000007FEF5AAF000-memory.dmp

    Filesize

    4KB

  • memory/2112-5-0x000000001B670000-0x000000001B952000-memory.dmp

    Filesize

    2.9MB

  • memory/2112-6-0x0000000001D90000-0x0000000001D98000-memory.dmp

    Filesize

    32KB

  • memory/2112-7-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

    Filesize

    9.6MB

  • memory/2112-10-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

    Filesize

    9.6MB

  • memory/2112-9-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

    Filesize

    9.6MB

  • memory/2112-8-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

    Filesize

    9.6MB

  • memory/2112-11-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

    Filesize

    9.6MB