Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
ir57.ps1
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
ir57.ps1
-
Size
45KB
-
MD5
89e354675df948788a5fa232d63ba466
-
SHA1
8f50c2baca722f1a609e4a9fcb77f61aeee9a264
-
SHA256
b62aeafee239618b67035c01a5aa3033839c8bf4b3208c83d91bf4b2f8fe00da
-
SHA512
4cafcdb2c408f863788df7abbf83b505f4f22ad6b35158c0dba453b5c8e974bbf82e2020b007f1239293ce67dbc0882c8fca852251628401a8c8bf9e6ab10bc6
-
SSDEEP
768:lYlQDMFLlZX6lQ517palQ59UXpimACnK1V4/EUVfLlK+n0XlQwlQ0:OlQDoKlQ5ClQ7UwwMVIV4+8lQwlQ0
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1992 powershell.exe -
Downloads MZ/PE file
-
pid Process 1992 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1992 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ir57.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992