Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2025, 00:05

General

  • Target

    c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.ps1

  • Size

    2KB

  • MD5

    65c8115dabcc202be32249a26321fcad

  • SHA1

    8789f4cd12c7b07168e1411433f64ddc20214603

  • SHA256

    c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee

  • SHA512

    5bf9d9b35f0ad81f1e9e91497008b50d038d894dd73a6a5dc166a108aa63847cd0026dc3539f65a64dae6634451635c939c3c8afee5801c714298e17f101fe58

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2560-4-0x000007FEF549E000-0x000007FEF549F000-memory.dmp

    Filesize

    4KB

  • memory/2560-5-0x000000001B740000-0x000000001BA22000-memory.dmp

    Filesize

    2.9MB

  • memory/2560-7-0x000007FEF51E0000-0x000007FEF5B7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2560-6-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

    Filesize

    32KB

  • memory/2560-8-0x000007FEF51E0000-0x000007FEF5B7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2560-9-0x000007FEF51E0000-0x000007FEF5B7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2560-10-0x000007FEF51E0000-0x000007FEF5B7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2560-12-0x000007FEF51E0000-0x000007FEF5B7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2560-11-0x000007FEF51E0000-0x000007FEF5B7D000-memory.dmp

    Filesize

    9.6MB