Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
beks.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
beks.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cr.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
cr.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
psiniziale.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
psiniziale.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
zukaz.ps1
Resource
win7-20240903-en
General
-
Target
psiniziale.ps1
-
Size
498B
-
MD5
c26768a5961c38415ae0d4100ed280ed
-
SHA1
ad96a0593e494ddf98feb3094521f858ae53abb0
-
SHA256
a2934d3110084fbb9656ba92a0a94f5508b5000e8461f3135e60c1e7c7e94caa
-
SHA512
754286947111fe52bf512da0c97ec790d6e75979ffead2dc0fbcdcbe23e39d371f8fbaeed592588166542bece9fbaf5eb42909b8e72ddf76f1ce13ca73f6b0e2
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 3040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3040 powershell.exe