Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 18:13
Static task
static1
Behavioral task
behavioral1
Sample
iubn.ps1
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
iubn.ps1
-
Size
1KB
-
MD5
1ec2c58c17fc606446451058a6961972
-
SHA1
abfd1b16246bcce8721d2c5aa85cfa354135f2ff
-
SHA256
5e8a676a5b37f85a09339873a139a73268662b1c0bfe94d764bbfffec60ea196
-
SHA512
7365d26c3b74e25d18618d3042ff98fedae2d1e5db6f2c6d0a7034582141a78e5c2df949477c1169e471ced3fcf94d660b7cd8655ecd6bda2d803f1ecc0c0f17
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2696 powershell.exe -
Downloads MZ/PE file
-
pid Process 2696 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\iubn.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696