Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 03:35
Static task
static1
Behavioral task
behavioral1
Sample
5e8a676a5b37f85a09339873a139a73268662b1c0bfe94d764bbfffec60ea196.ps1
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
5e8a676a5b37f85a09339873a139a73268662b1c0bfe94d764bbfffec60ea196.ps1
-
Size
1KB
-
MD5
1ec2c58c17fc606446451058a6961972
-
SHA1
abfd1b16246bcce8721d2c5aa85cfa354135f2ff
-
SHA256
5e8a676a5b37f85a09339873a139a73268662b1c0bfe94d764bbfffec60ea196
-
SHA512
7365d26c3b74e25d18618d3042ff98fedae2d1e5db6f2c6d0a7034582141a78e5c2df949477c1169e471ced3fcf94d660b7cd8655ecd6bda2d803f1ecc0c0f17
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 796 powershell.exe -
Downloads MZ/PE file
-
pid Process 796 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 796 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\5e8a676a5b37f85a09339873a139a73268662b1c0bfe94d764bbfffec60ea196.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:796