Analysis
-
max time kernel
126s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
ps1001.ps1
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ps1001.ps1
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
ps1001.ps1
-
Size
785KB
-
MD5
5996b2aa1d6b234a48ed62f1ecaae159
-
SHA1
4f6e56e34d7da66cb1f9b9ebc707f7fd01764352
-
SHA256
100a4c16630356774d7ebee6681d40279fcb4ceabccf194d371af739ca98ce53
-
SHA512
6d74c8bd7f52fedf55068a58cca93ce30582517a40d556b07c3f3ec3d5f17283b2cc7852601331bd77d1a3fd8f09b2f3cc6ebd7a2c6fa8a34cee45363eb80d0f
-
SSDEEP
12288:8ppYXT60Mv5a8kebcetZ3Aq74GA19Td1JplTmu5jP+D/43EeI1gZEtd14Q2f3Nug:fXWZ5Pbcq92zjP+sjI10+r4Q21ug
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid Process 7 2740 powershell.exe 9 2740 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2740 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 2740 wrote to memory of 2184 2740 powershell.exe 31 PID 2740 wrote to memory of 2184 2740 powershell.exe 31 PID 2740 wrote to memory of 2184 2740 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ps1001.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rpssfib8.cmdline"2⤵PID:2184
-