Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 03:22
Static task
static1
Behavioral task
behavioral1
Sample
23aea7e9d32f547db65c086e7d067439588d3f6599f13090679787385bbf2b93.ps1
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
23aea7e9d32f547db65c086e7d067439588d3f6599f13090679787385bbf2b93.ps1
-
Size
513KB
-
MD5
979c81c2d61e875e5634a5874d50f402
-
SHA1
282f92e764c81121553f2e31035f88e5b0803a01
-
SHA256
23aea7e9d32f547db65c086e7d067439588d3f6599f13090679787385bbf2b93
-
SHA512
2d6f6fca8b81d27f9378b4d9cd83e54d7209754f2a5535f2a1133ff29ccdd4428d2845c862b55e71f7ef760c641e1e30433387ae50512c494b8b74430f1524a1
-
SSDEEP
12288:rrSE6qcSyjKO2E1WvnbYToYQSD7PJLuzJj5wD:6Dqch2O1WfbYTBDzduhOD
Score
3/10
Malware Config
Signatures
-
pid Process 2872 powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2696 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2696 2872 powershell.exe 32 PID 2872 wrote to memory of 2696 2872 powershell.exe 32 PID 2872 wrote to memory of 2696 2872 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\23aea7e9d32f547db65c086e7d067439588d3f6599f13090679787385bbf2b93.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:2696
-