Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
8bc12fbce8d8c38f2d2fa799632e8179c6d5c11e62c51ef2eeb8b110ea51b058N.ps1
Resource
win7-20240903-en
5 signatures
120 seconds
Behavioral task
behavioral2
Sample
8bc12fbce8d8c38f2d2fa799632e8179c6d5c11e62c51ef2eeb8b110ea51b058N.ps1
Resource
win10v2004-20240802-en
5 signatures
120 seconds
General
-
Target
8bc12fbce8d8c38f2d2fa799632e8179c6d5c11e62c51ef2eeb8b110ea51b058N.ps1
-
Size
1.0MB
-
MD5
a6f20cc1e31ef031cc147748cc261f60
-
SHA1
3d222a767a7e414f3d35e125ee54376022bb90b5
-
SHA256
8bc12fbce8d8c38f2d2fa799632e8179c6d5c11e62c51ef2eeb8b110ea51b058
-
SHA512
6afc5418c7988af46ba4c11dbfb9294295a943142ac88818d051cbfa5c52e587b45e5154db7050edb0f279826f28080e6aa5c5f1513dfc1c1ca5b0387272ce63
-
SSDEEP
24576:5BMOYxXe1b18rvqj+J2C4jR5x4+2KmlxdbEBb:5W/GiQC+2F3c
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 7 2524 powershell.exe 9 2524 powershell.exe -
pid Process 2524 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2524 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2524 wrote to memory of 676 2524 powershell.exe 32 PID 2524 wrote to memory of 676 2524 powershell.exe 32 PID 2524 wrote to memory of 676 2524 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8bc12fbce8d8c38f2d2fa799632e8179c6d5c11e62c51ef2eeb8b110ea51b058N.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gdm7ti65.cmdline"2⤵PID:676
-