Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 15:41
Static task
static1
Behavioral task
behavioral1
Sample
malicious_script_1.ps1
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
malicious_script_1.ps1
-
Size
2KB
-
MD5
a19cff86bcb8ba356ca034582a53f870
-
SHA1
d9a1cf4e9125ab420ebb614f67cb81c6efed1afb
-
SHA256
ae7811c08d45da31fecb2a31c6491459765667f12bc187abaf40db75755e4b1a
-
SHA512
4c5e9fb74d890d1b69f1ebc2fc5daae20229f69bee3f4a1e26b8f9465812f39555de5e15dcbda7b1fc3a6c6042dca05d57b4591cd2f545935d8d5e4a75d4e9a6
Score
3/10
Malware Config
Signatures
-
pid Process 2372 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\malicious_script_1.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372