Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
secrator.ps1
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
secrator.ps1
-
Size
493B
-
MD5
7cc08429b87f9aba8606e95114957b82
-
SHA1
2ba425be1fe0f12fa419bc93c22e7a2079b0c6b7
-
SHA256
856be8a4d18a57d625d371054956b9ff1b9824e05894530bcf843629dce33cac
-
SHA512
91bf2f2c4090505e0606802aa64c1220729f08f1f3087cd5d4d81923d4d838a8459686a33fa60c2291398560aa47b19f697a29d067bd4cfbc4ff018c909bc4c9
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 1632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 1632 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\secrator.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2132